want1997's starred repositories
transformerAD
Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"
CodeReviewFromZero
代码审计系统学习
HackReport
渗透测试报告/资料文档/渗透经验文档/安全书籍
JavaSecurityLearning
记录一下 Java 安全学习历程,也算是半条学习路线了
reverse-sourcemap
:telescope: Reverse engineering JavaScript and CSS sources from sourcemaps
SuiteCRM-Core
SuiteCRM - Open source CRM for the world
IoT-vulnerable
IoT-vulnerable
sloth-project-profile
人和人之间的区别有二: 第一是肉体的区别。 第二是时间的分配不同。 没有什么小白,没有什么大佬,你时间花到位了,都是一样的,这些所谓的小天赋的东西, 当你花的时间达到一个量级的时候,就会慢慢烟消云散。 接受自己的平庸,保持乐观,坚持不懈,这是每个优秀的人必备的品质。
BurpAppletPentester
SessionKey解密插件
Java-Programmer300-Demos
Java程序设计经典300例一书手敲代码,都是Java日常开发广泛使用的实例,更好理解面向对象以及实际编程化解问题的能力。
Offensive-Security-Cheat-Sheet
A compilation of important commands, files, and tools used in Pentesting
IDS-Feature-Selection-based-on-GWO-algorithm
One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, wherein the network traffic performance is unpredictable, and the problematic space features are numerous. These make intrusion detection systems (IDSs) a challenge within the research arena. Hence, selecting the essential aspects for intrusion detection is crucial in information security and with that, this study identified the related features in building a computationally efficient and effective intrusion system. Accordingly, a modified feature selection (FS) algorithm called modified binary grey wolf optimisation (MBGWO) is proposed in this study. The proposed algorithm is based on binary grey wolf optimisation to boost the performance of IDS. The new FS algorithm selected an optimal number of features. In order to evaluate the proposed algorithm, the benchmark of NSL-KDD network intrusion, which was modified from 99-data set KDD cup to assess issues linked with IDS, had been applied in this study. Additionally, the support vector machine was employed to classify the data set effectively. The proposed FS and classification algorithms enhanced the performance of the IDS in detecting attacks. The simulation outcomes portrayed that the proposed algorithm enhanced the accuracy of intrusion detection and reduction in the number of features.
Wrapper-Feature-Selection-Toolbox-Python
This toolbox offers 13 wrapper feature selection methods (PSO, GA, GWO, HHO, BA, WOA, and etc.) with examples. It is simple and easy to implement.
Awesome-POC
一个漏洞POC知识库 目前数量 1000+
Vulnerability-Wiki
基于 docsify 快速部署 Awesome-POC 中的漏洞文档
PSOFeatureSelection
A Particle Swarm Optimization (PSO) for Feature Selection. Using PySwarm.
FeatureSelectionGA
Feature Selection using Genetic Algorithm (DEAP Framework)
Cyberspace_Security_Learning
在学习CTF、网络安全路上整合自己博客和一些资料,持续更新~
Free-Web-Books
Learn books from TCP/IP | HTTP(s) | HTML、CSS、JS、JQuery | Vue | PHP | Web | Web Server
python-django-learning
🍺 python 和 diango 学习资料,书籍,文章,以及实战项目等等
AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~