Skip to content
View BeckDevil's full-sized avatar

Block or report BeckDevil

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. prov2vec prov2vec Public

    An end-to-end system that utilizes representation learning on provenance graph in order to detect the compromised hosts and users.

    4 1

  2. Threat-Hunting-with-CAR Threat-Hunting-with-CAR Public

    The set of rules based on MITRE Cyber Analytics Repository's data model.

    2

  3. subgraph_listing subgraph_listing Public

    C++ 1

  4. CFI-Enforcement CFI-Enforcement Public

    Control Flow Integrity (CFI) enforcement programs

    Assembly 1 1

  5. Awesome-Ethical-Hacking-Resources Awesome-Ethical-Hacking-Resources Public

    Forked from husnainfareed/awesome-ethical-hacking-resources

    🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.

    1

  6. 100-Days-of-NLP 100-Days-of-NLP Public

    Forked from graviraja/100-Days-of-NLP

    Jupyter Notebook 1 1