urwithajit9
I am a learner. I like to program for anything but Cyber security & Forensic, AI & ML and Web development take me to deep diving. Python, C, C++
India
Pinned Repositories
100-days-of-code
Fork this template for the 100 days journal - to keep yourself accountable
ClaMP
A Malware classifier dataset built with header fields’ values of Portable Executable files
FAMOUS
FAMOUS is a forensic analysis tool built to triage Android applications and to assist the analyst in the selection of applications for further in-depth or manual analysis. The motivation behind FAMOUS is to overcome the limitations of the signature-based triaging forensic tool. The main functions of FAMOUS is to assign a proper class label (among benign and malware/suspicious) to every selected Android application by underlying classification engine. Each classification engine is built by training and testing different machine learning algorithms on proposed permission’s score based feature set that is extracted from a large dataset. Currently, in the proof-of-concept implementation, it has only best-performing classifier but it can be easily extended with more classifiers. Screenshots of the main window and result window of FAMOUS are attached for Understanding..
FDIA-classification
This repository will have pre-processed dataset and related scripts for building Machine learning based model for classification of False Data Injection Attack.
HG_NeuralNetwork
Python code for Hacker's guide to Neural Networks - Andrej Karpathy blog
huggingface-demo-mlops-coursera
learning-rust
This repo has example code from leanring rust from MLops coursera .
MLOps-pytest-coursera
Learning codespace and Pytest under coursera MLOps course
MLops-template-coursera
This is a template taken from MLops class from coursera
Practical-Machine-Learning-With-Python
Machine Learning Tutorials in Python
urwithajit9's Repositories
urwithajit9/FDIA-classification
This repository will have pre-processed dataset and related scripts for building Machine learning based model for classification of False Data Injection Attack.
urwithajit9/F2Amapper
This is python script that will extract the functions call in all used DLL in an executable and then provide a mapping of those functions to the attack classes defined and curated malapi.io.
urwithajit9/MLEP-public
Public repo for DeepLearning.AI MLEP Specialization
urwithajit9/moviepy
Video editing with Python
urwithajit9/SOREL-20M
Sophos-ReversingLabs 20 million sample dataset
urwithajit9/FAMOUS
FAMOUS is a forensic analysis tool built to triage Android applications and to assist the analyst in the selection of applications for further in-depth or manual analysis. The motivation behind FAMOUS is to overcome the limitations of the signature-based triaging forensic tool. The main functions of FAMOUS is to assign a proper class label (among benign and malware/suspicious) to every selected Android application by underlying classification engine. Each classification engine is built by training and testing different machine learning algorithms on proposed permission’s score based feature set that is extracted from a large dataset. Currently, in the proof-of-concept implementation, it has only best-performing classifier but it can be easily extended with more classifiers. Screenshots of the main window and result window of FAMOUS are attached for Understanding..
urwithajit9/advmlthreatmatrix
Adversarial Threat Matrix
urwithajit9/aflnet
AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)
urwithajit9/CoSimul_Platform
A smart grid co-simulation platform based on mosaik
urwithajit9/DeepRobust
A pytorch adversarial library for attack and defense methods on images and graphs
urwithajit9/Federated-Learning-for-Traffic-Sign-Recognition
In this project, we build a simple federated deep learning model (i.e., LeNet model) that classifies 62 differents Belgian Traffic Signs.
urwithajit9/FedEval
urwithajit9/Khepri
🔥🔥🔥Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++, the architecture and usage like Cobalt Strike
urwithajit9/Labeled-Elfs
A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in executables and training various ML models.
urwithajit9/learning-malware-analysis
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
urwithajit9/LIEF
LIEF - Library to Instrument Executable Formats
urwithajit9/LLSF-Learning-Label-Specific-Features-for-Multi-Label-Classifcation
A research paper implementation from scratch for improving classification for imbalanced datasets.
urwithajit9/malware-sample-library
Malware sample library.
urwithajit9/malware-samples
Malware samples and other artifacts
urwithajit9/managed_ml_systems_and_iot
Managed Machine Learning Systems and Internet of Things Live Lesson
urwithajit9/mbc-markdown
MBC content in markdown
urwithajit9/osq-ext-bin
Extension to osquery windows that enhances it with real-time telemetry, log monitoring and other endpoint data collection
urwithajit9/paper_collection
Academic papers related to fuzzing, binary analysis and exploit dev, that I want to read or have already read
urwithajit9/plaso
Super timeline all the things
urwithajit9/RegRipper2.8
RegRipper version 2.8
urwithajit9/restless
Always-on anti-malware software using malicious language processing (hierarchical attention network). Functional WIP
urwithajit9/SplitFed-When-Federated-Learning-Meets-Split-Learning
Releasing the source code Version1.
urwithajit9/tripwire-open-source
Open Source Tripwire®
urwithajit9/v18
urwithajit9/Windows-PE32-malware-dynamic-analysis
A set of scripts for automated dynamic MS Windows PE32 malware analysis using sandbox virtual environemnt