├── .github └── workflows │ └── linter.yaml ├── .gitignore ├── Anomaly-Detection ├── S&P_500_Anomaly_Detection_multivariate.ipynb ├── SPX_500_Anomaly_Detection - PYOD and sklearn.ipynb ├── SPX_500_Anomaly_Detection - Stumpy.ipynb └── readme.md ├── Intrusion-Detection ├── KDD cup '99 │ ├── Intrusion_Detection_Multiclass_V3.ipynb │ ├── Intrusion_Detection_Singleclass.ipynb │ ├── KDD_autoencoder.ipynb │ ├── README.md │ ├── kddcup.data.7z │ └── old │ │ ├── Intrusion_Detection_Multiclass.ipynb │ │ └── Intrusion_Detection_Multiclass_V2.ipynb ├── NSL_KDD │ └── NSL_KDD.ipynb ├── README.md ├── Robust Random Cut Forest - ALGO │ └── sample_code.py ├── UNSW_NB15 - PyTorch Categorical Variational AutoEncoder with Gumbel Softmax.ipynb ├── UNSW_NB15 - PyTorch MLP and autoEncoder.ipynb ├── UNSW_NB15 - PyTorch feature selection via L1 regularization on layer_1.ipynb ├── UNSW_NB15 - Unsupervised PYOD.ipynb ├── UNSW_NB15.ipynb ├── co-op project.pdf └── model.pth ├── Offensive Network Security and Pentesting oct 2015.pdf ├── README.md ├── Readings ├── Anomaly Detection Methods for Categorical Data A Review.pdf ├── Anomaly Detection for Application Log Data.pdf ├── Deep leanring for Anomaly Detection - a survey.pdf ├── ICDM2011 anomaly detection tutorial.pdf ├── Incident Response and Computer Forensics.pdf ├── Machine Learning and Extremes for Anomaly Detection.pdf ├── Outlier Detection A Survey.pdf ├── Recent Advances in NLP - aribic language.pdf ├── bypassing-av.pdf ├── kdd10-outlier-tutorial.pdf ├── probability_cheatsheet.pdf ├── readme.md └── security-plus-sy0-601-all.md ├── Utilities ├── Encrypter │ ├── Encrypter.py │ └── to_enc.txt.enc ├── Get HTML tables │ ├── get HTML tables - checkpoint.py │ └── get HTML tables.py ├── Rainbow-table-of-several-hashing-algorithms │ ├── Compute_Rainbow_table.ipynb │ ├── README.md │ ├── remove duplicates.py │ └── screenshot.JPG ├── Windows registry Java remove python exe.7z ├── bandwidth-hog │ ├── bandwidth-hog.py │ └── readme.md ├── dos.py └── unExpectedProcessChecker.py └── co-op project.pdf /.github/workflows/linter.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/.github/workflows/linter.yaml -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/.gitignore -------------------------------------------------------------------------------- /Anomaly-Detection/S&P_500_Anomaly_Detection_multivariate.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Anomaly-Detection/S&P_500_Anomaly_Detection_multivariate.ipynb -------------------------------------------------------------------------------- /Anomaly-Detection/SPX_500_Anomaly_Detection - PYOD and sklearn.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Anomaly-Detection/SPX_500_Anomaly_Detection - PYOD and sklearn.ipynb -------------------------------------------------------------------------------- /Anomaly-Detection/SPX_500_Anomaly_Detection - Stumpy.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Anomaly-Detection/SPX_500_Anomaly_Detection - Stumpy.ipynb -------------------------------------------------------------------------------- /Anomaly-Detection/readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Anomaly-Detection/readme.md -------------------------------------------------------------------------------- /Intrusion-Detection/KDD cup '99/Intrusion_Detection_Multiclass_V3.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/KDD cup '99/Intrusion_Detection_Multiclass_V3.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/KDD cup '99/Intrusion_Detection_Singleclass.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/KDD cup '99/Intrusion_Detection_Singleclass.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/KDD cup '99/KDD_autoencoder.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/KDD cup '99/KDD_autoencoder.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/KDD cup '99/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/KDD cup '99/README.md -------------------------------------------------------------------------------- /Intrusion-Detection/KDD cup '99/kddcup.data.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/KDD cup '99/kddcup.data.7z -------------------------------------------------------------------------------- /Intrusion-Detection/KDD cup '99/old/Intrusion_Detection_Multiclass.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/KDD cup '99/old/Intrusion_Detection_Multiclass.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/KDD cup '99/old/Intrusion_Detection_Multiclass_V2.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/KDD cup '99/old/Intrusion_Detection_Multiclass_V2.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/NSL_KDD/NSL_KDD.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/NSL_KDD/NSL_KDD.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/README.md -------------------------------------------------------------------------------- /Intrusion-Detection/Robust Random Cut Forest - ALGO/sample_code.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/Robust Random Cut Forest - ALGO/sample_code.py -------------------------------------------------------------------------------- /Intrusion-Detection/UNSW_NB15 - PyTorch Categorical Variational AutoEncoder with Gumbel Softmax.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/UNSW_NB15 - PyTorch Categorical Variational AutoEncoder with Gumbel Softmax.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/UNSW_NB15 - PyTorch MLP and autoEncoder.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/UNSW_NB15 - PyTorch MLP and autoEncoder.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/UNSW_NB15 - PyTorch feature selection via L1 regularization on layer_1.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/UNSW_NB15 - PyTorch feature selection via L1 regularization on layer_1.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/UNSW_NB15 - Unsupervised PYOD.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/UNSW_NB15 - Unsupervised PYOD.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/UNSW_NB15.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/UNSW_NB15.ipynb -------------------------------------------------------------------------------- /Intrusion-Detection/co-op project.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/co-op project.pdf -------------------------------------------------------------------------------- /Intrusion-Detection/model.pth: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Intrusion-Detection/model.pth -------------------------------------------------------------------------------- /Offensive Network Security and Pentesting oct 2015.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Offensive Network Security and Pentesting oct 2015.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/README.md -------------------------------------------------------------------------------- /Readings/Anomaly Detection Methods for Categorical Data A Review.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/Anomaly Detection Methods for Categorical Data A Review.pdf -------------------------------------------------------------------------------- /Readings/Anomaly Detection for Application Log Data.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/Anomaly Detection for Application Log Data.pdf -------------------------------------------------------------------------------- /Readings/Deep leanring for Anomaly Detection - a survey.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/Deep leanring for Anomaly Detection - a survey.pdf -------------------------------------------------------------------------------- /Readings/ICDM2011 anomaly detection tutorial.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/ICDM2011 anomaly detection tutorial.pdf -------------------------------------------------------------------------------- /Readings/Incident Response and Computer Forensics.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/Incident Response and Computer Forensics.pdf -------------------------------------------------------------------------------- /Readings/Machine Learning and Extremes for Anomaly Detection.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/Machine Learning and Extremes for Anomaly Detection.pdf -------------------------------------------------------------------------------- /Readings/Outlier Detection A Survey.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/Outlier Detection A Survey.pdf -------------------------------------------------------------------------------- /Readings/Recent Advances in NLP - aribic language.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/Recent Advances in NLP - aribic language.pdf -------------------------------------------------------------------------------- /Readings/bypassing-av.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/bypassing-av.pdf -------------------------------------------------------------------------------- /Readings/kdd10-outlier-tutorial.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/kdd10-outlier-tutorial.pdf -------------------------------------------------------------------------------- /Readings/probability_cheatsheet.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/probability_cheatsheet.pdf -------------------------------------------------------------------------------- /Readings/readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/readme.md -------------------------------------------------------------------------------- /Readings/security-plus-sy0-601-all.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Readings/security-plus-sy0-601-all.md -------------------------------------------------------------------------------- /Utilities/Encrypter/Encrypter.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Encrypter/Encrypter.py -------------------------------------------------------------------------------- /Utilities/Encrypter/to_enc.txt.enc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Encrypter/to_enc.txt.enc -------------------------------------------------------------------------------- /Utilities/Get HTML tables/get HTML tables - checkpoint.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Get HTML tables/get HTML tables - checkpoint.py -------------------------------------------------------------------------------- /Utilities/Get HTML tables/get HTML tables.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Get HTML tables/get HTML tables.py -------------------------------------------------------------------------------- /Utilities/Rainbow-table-of-several-hashing-algorithms/Compute_Rainbow_table.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Rainbow-table-of-several-hashing-algorithms/Compute_Rainbow_table.ipynb -------------------------------------------------------------------------------- /Utilities/Rainbow-table-of-several-hashing-algorithms/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Rainbow-table-of-several-hashing-algorithms/README.md -------------------------------------------------------------------------------- /Utilities/Rainbow-table-of-several-hashing-algorithms/remove duplicates.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Rainbow-table-of-several-hashing-algorithms/remove duplicates.py -------------------------------------------------------------------------------- /Utilities/Rainbow-table-of-several-hashing-algorithms/screenshot.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Rainbow-table-of-several-hashing-algorithms/screenshot.JPG -------------------------------------------------------------------------------- /Utilities/Windows registry Java remove python exe.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/Windows registry Java remove python exe.7z -------------------------------------------------------------------------------- /Utilities/bandwidth-hog/bandwidth-hog.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/bandwidth-hog/bandwidth-hog.py -------------------------------------------------------------------------------- /Utilities/bandwidth-hog/readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/bandwidth-hog/readme.md -------------------------------------------------------------------------------- /Utilities/dos.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/dos.py -------------------------------------------------------------------------------- /Utilities/unExpectedProcessChecker.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/Utilities/unExpectedProcessChecker.py -------------------------------------------------------------------------------- /co-op project.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alik604/cyber-security/HEAD/co-op project.pdf --------------------------------------------------------------------------------