Machine Learning for Cyber Security
-
Updated
Apr 11, 2024
Machine Learning for Cyber Security
Free Security and Hacking eBooks
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
A collection of awesome security hardening guides, tools and other resources
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
IntelOwl: manage your Threat Intelligence at scale
Tools and Techniques for Blue Team / Incident Response
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
🎯 XML External Entity (XXE) Injection Payload List
📝 ⌨️ A GNU/Linux keylogger that works!
Nidhogg is an all-in-one simple to use rootkit.
A Broken Application - Very Vulnerable!
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Penetration Testing notes, resources and scripts
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
🎓 Because Education should be free. Contributions welcome! 🕵️
Don't let buffer overflows overflow your mind
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."