Mastering-Machine-Learning-for-Penetration-Testing
Penetration testing book
Teaches penetration testing and cybersecurity techniques using machine learning
Mastering Machine Learning for Penetration Testing, published by Packt
358 stars
21 watching
206 forks
Language: Python
last commit: about 2 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A comprehensive guide to building machine learning models for streaming data in Python | 68 |
| An implementation of Manning Publications' How Machine Learning Works book in Python using Jupyter Notebook | 4 |
| A collection of examples and code snippets teaching machine learning concepts to security professionals through hands-on Python projects | 151 |
| Teaches data analysts and developers to create smart investment strategies using machine learning algorithms | 1,516 |
| A framework for training reinforcement learning agents to generalize in novel penetration-testing scenarios | 33 |
| A framework for training Reinforcement Learning agents in simulated network environments for penetration testing purposes. | 23 |
| An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 |
| This is a collection of machine learning algorithms implemented in Python 3.6. | 103 |
| A comprehensive resource for penetration testing and vulnerability assessment | 669 |
| A cheat sheet and resource collection for learning and practicing penetration testing and exploit development | 795 |
| A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| An agent trained to scan for vulnerabilities and exploit them in a simulated network environment | 23 |
| A set of BurpSuite extensions for pentesting and testing | 10 |
| The codebase provides MATLAB implementations of machine learning concepts from S. Theodoridis' book | 66 |
| Develops a method for pre-training language understanding models by combining masked and permuted techniques, and provides code for implementation and fine-tuning. | 288 |