Umay: IoT Malware Similarity Analysis Platform
Umay – IoT Malware Similarity Analysis Platform This project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code with the...
Umay – IoT Malware Similarity Analysis Platform This project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code with the...
SyntheticSun SyntheticSun is defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats....
mushikago Mushikago is an automatic penetration testing tool using game AI, which focuses on the verification of post-exploit among penetration testing tools. Features Full Automatic penetration testing tool Device detection...
WAF-A-MoLE A guided mutation-based fuzzer for ML-based Web Application Firewalls, inspired by AFL and based on the FuzzingBook by Andreas Zeller et al. Given an input SQL injection query, it tries to produce a semantic...
AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning AutoPentest-DRL is an automated penetration testing framework based on Deep Reinforcement Learning (DRL) techniques. The framework determines the most appropriate attack path...
Detection of Sensitive Data Exposure in Images In the current age of smart devices and smartphones, any image taken using these devices is immediately auto uploaded to the cloud (Google...
The idea of artificial intelligence (AI) has captured human imagination ever since it was first conceived. Nowadays AI is more than just an idea. The influence of computers on our...
Machine Learning / Vulnerability Analysis
by do son · Published March 16, 2021 · Last modified October 11, 2021
Adversarial Threat Detector Adversarial Threat Detector makes AI development Secure. In recent years, deep learning technology has been developing, and various systems using deep learning are spreading in our society,...
Automated Security Risk Identification Using AutomationML-based Engineering Data This prototype identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts. The results...
Pesidious – Malware Mutation using Deep Reinforcement Learning and GANs Pesidious is an open-source tool that uses Generative Adversarial Networks (GAN) and Reinforcement Learning (RL) to generate mutative malware that...
SharpML SharpML is a proof of concept file share data mining tool using Machine Learning in Python and C#. The tool is discussed in more detail on our blog here, but...
pcfg_cracker This project uses machine learning to identify password creation habits of users. A PCFG model is generated by training on a list of disclosed plaintext/cracked passwords. In the context...
Deep Learning models for network traffic classification The development of an anomaly-based intrusion detection system (IDS) is a primary research direction in the field of intrusion detection. An IDS learns...
Machine Learning / Reverse Engineering
by do son · Published November 28, 2019 · Last modified November 4, 2024
Kam1n0 v2.x is scalable assembly management and analysis platform. It allows a user to first index a (large) collection of binaries into different repositories and provides different analytic services such...
Attack Monitor Attack Monitor is Python application written to enhance security monitoring capabilities of Windows 7/2008 (and all later versions) workstations/servers and to automate dynamic analysis of malware. Current modes...