Machine Learning

Explore 92 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Trellix Endpoint Security Suite Logo

Comprehensive endpoint security solution providing proactive defenses, remediation tools, and centralized management to prevent threats and ensure uptime.

0
Project Icewater Logo

A project providing open-source YARA rules for malware and malicious file detection

0
LORG Logo

A tool for advanced HTTPD logfile security analysis and forensics, implementing various techniques to detect attacks against web applications.

0
Zeek Analysis Tools (ZAT) Logo

ZAT is a Python package that processes and analyzes Zeek network security data using machine learning libraries like Pandas, scikit-learn, Kafka, and Spark.

0
Sophos AI YaraML Rules Repository Logo

A tool that generates Yara rules from training data using logistic regression and random forest classifiers.

0
RiskInDroid Logo

RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.

0
Comodo Advanced Endpoint Protection Logo

Advanced Endpoint Protection is a complete endpoint protection platform that provides advanced threat protection against ransomware, data breaches, and malware.

0
Data Hacking Project Logo

An educational project that teaches data analysis techniques for cybersecurity applications using Python tools like IPython, Pandas, and Scikit Learn through practical exercises and realistic scenarios.

0
Maldatabase Logo

Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.

0
Netcap Logo

Netcap efficiently converts network packets into structured audit records for machine learning algorithms, using Protocol Buffers for encoding.

0
IPython Notebook Logo

Interactive computational environment for code execution, text, and media combination.

0
Ryan Stillions: The DML model Logo

A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.

0
Malheur Logo

Automatic analysis of malware behavior using machine learning.

0
StringSifter Logo

StringSifter is a machine learning tool that automatically ranks strings extracted from malware samples based on their relevance for analysis.

0
ManaTI Project Logo

Machine learning project for intuitive threat analysis with a web interface.

0
OpenText Core Endpoint Protection Logo

Cloud-based endpoint protection using machine learning and threat intel

0
maxmind.com Logo

MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.

0
LogonTracer Logo

Investigate malicious logons by visualizing and analyzing Windows Active Directory event logs with LogonTracer.

0
StegaStamp Logo

Hide data in images while maintaining perceptual similarity and extract it from printed and photographed images.

0
BlueBox Malware Analysis Box and Cyber Threat Hunting Logo

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.

0