王宏超's repositories
AISEC-Paper-Collector
AI&安全论文搜索工具,在AI-Paper-Collector增加近五年安全顶会
node_detection
基于https://github.com/threaTrace-detector/threaTrace中的darpatc cadets处理与检测部分,修改了输入输出和模型训练的部分代码,使用自建数据集重新训练了模型、加入IOC降低误报并验证了效果
adsb-receiver
Create your own ADS-B receiver and web portal.
AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
apt
B Tech project for APT detection using provenance graphs
APT-KGL
APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Audit-log-analysis
Have fun with audit log analysis :)
awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
DeTTECT
Detect Tactics, Techniques & Combat Threats
ET-BERT
The repository of ET-BERT, a network traffic classification model on encrypted traffic. The work has been accepted as The Web Conference (WWW) 2022 accepted paper.
Graph-Adversarial-Learning
A curated collection of adversarial attack and defense on graph data.
graph-adversarial-learning-literature
A curated list of adversarial attacks and defenses papers on graph-structured data.
GRR-deploy
grr sh-sheet
iTerm2-Color-Schemes
Over 250 terminal color schemes/themes for iTerm/iTerm2. Includes ports to Terminal, Konsole, PuTTY, Xresources, XRDB, Remmina, Termite, XFCE, Tilda, FreeBSD VT, Terminator, Kitty, MobaXterm, LXTerminal, Microsoft's Windows Terminal, Visual Studio, Alacritty
Knowledge-enhanced-Attack-Graph
AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports
MacIDATools
macos Monterey 版本 12.1 MacBook Pro (13-inch, 2020, Four Thunderbolt 3 ports) IDA自用
MAGIC
Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"
mitre-visualizer
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Provenance-Graph-for-Attack-Detection
基于溯源图的入侵/威胁检测相关论文及阅读笔记
provninja
Evading Provenance-Based ML Detectors with Adversarial System Actions
Security-PPT
Security-related Slide Presentation & Security Research Report(大安全各领域各公司各会议分享的PPT以及各类安全研究报告)
V-S-T-sub
帅哥的事,少管!
WatchAD
AD Security Intrusion Detection System
YesPlayMusic
高颜值的第三方网易云播放器,支持 Windows / macOS / Linux :electron: