vickyngo-code's Stars
GreyDGL/PentestGPT
A GPT-empowered penetration testing tool
vmayoral/ExploitFlow
A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.
pentestmonkey/php-reverse-shell
ipa-lab/hackingBuddyGPT
Helping Ethical Hackers use LLMs in 50 Lines of Code or less..
phiresky/ripgrep-all
rga: ripgrep, but also search in PDFs, E-Books, Office documents, zip, tar.gz, etc.
password123456/linux-security-audit
Linux Security Audit Tool
ThreatConnect-Inc/tcex
ThreatConnect Exchange App Framework
RhinoSecurityLabs/CVEs
A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.
gyoisamurai/GyoiThon
GyoiThon is a growing penetration test tool using Machine Learning.
juliocesarfort/public-pentesting-reports
A list of public penetration test reports published by several consulting firms and academic security groups.
ChrisMBarr/recruiting-hell
A collection of terrible and weird interactions with recruiters, job descriptions, questions, and technical assessments
Ebazhanov/linkedin-skill-assessments-quizzes
Full reference of LinkedIn answers 2024 for skill assessments (aws-lambda, rest-api, javascript, react, git, html, jquery, mongodb, java, Go, python, machine-learning, power-point) linkedin excel test lösungen, linkedin machine learning test LinkedIn test questions and answers
Anof-cyber/Application-Security
Resources for Application Security including Web, API, Android, iOS and Thick Client
typoes/harry-potter-gen-z
Harry Potter: The Gen Z Edition
doriguzzi/flad-federated-learning-ddos
Adaptive Federated Learning Approach to DDoS attack detection
Guillem96/madgan-pytorch
Multivariate Anomaly Detection with GAN (MAD-GAN) PyTorch modern implementation.
LiDan456/MAD-GANs
Applied generative adversarial networks (GANs) to do anomaly detection for time series data
LiDan456/GAN-AD
We used generative adversarial networks (GANs) to do anomaly detection for time series data.
igbe/DNP3-Dataset-Plus-SnortRules
This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm Application to Smart Grid Cyber-Attack Detection"
paperswithcode/releasing-research-code
Tips for releasing research code in Machine Learning (with official NeurIPS 2020 recommendations)
jivoi/awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
PlagueHO/CodessWhereToFromHere
Resources for Codess session "Where to from here".
vecnz/VECCTF2022
Challenge and writeups for VECCTF 2022
Rocionightwater/ML-NIDS-for-SCADA
In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concrete industrial used case scenario.
gfek/Real-CyberSecurity-Datasets
Public datasets to help you address various cyber security problems.
chiphuyen/dmls-book
Summaries and resources for Designing Machine Learning Systems book (Chip Huyen, O'Reilly 2022)
jake-fawcett/NN-for-DDoS
Code for University of York Dissertation Project on detecting DDoS attacks using CNNs and RNNs.
akash13singh/lstm_anomaly_thesis
Anomaly detection for temporal data using LSTMs
jayxsinha/Efficient-CNN-BiLSTM-for-Network-IDS
Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS
nicodjimenez/lstm
Minimal, clean example of lstm neural network training in python, for learning purposes.