Skip to content

Applied Machine Learning in Security

  • Python
  • Machine Learning
NLP

Most Popular Word Embedding Techniques for the Win

February 2, 2023February 2, 2023 jbower
Learn to understand word embedding techniques.

Introduction Word embeddings techniques are a type of representation for natural language processing tasks in machine learning. They map words or phrases from a vocabulary

Read More
Python

Python Regex Examples with Notes

July 2, 2018February 2, 2023 jbower

In this blog post you will learn about regular expressions (RegEx), and use Python’s re module to work with RegEx (with the help of examples).

Read More
Memory Forensics

Linux Memory Analysis: How to Start and What You Need to Know

August 7, 2017March 5, 2021 jbower

Are you ready to dive into the exciting world of memory analysis?!? No? Well that’s too bad because you need to know it. There’s an

Read More
Threat Intelligence

Threat Profile: Killer Swag

June 13, 2017January 27, 2023 jbower

Introduction I’ve been monitoring an interesting threat for the past several days, a group I’m referring to as “Killer Swag”. Mainly because the initial dropper

Read More
NIDS Threat Hunting

Threat Hunting with Bro IDS

February 20, 2017January 27, 2023 jbower

This post is a quick look at how I personally use Bro IDS for threat hunting. Specifically some of the queries I run when I

Read More
CTF

SkyDog Con 2016 CTF – Walk Through Guide

October 23, 2016January 28, 2021 jbower

Download Link The VM is now available for download on Vulnhub at the link below. https://www.vulnhub.com/entry/skydog-2016-catch-me-if-you-can,166/ Instructions The CTF is a virtual machine and works

Read More
NIDS

How to Install Bro IDS 2.5 on Ubuntu 16.0x

September 5, 2016January 27, 2023 jbower

I decided to write out the steps I took to for installing Bro IDS 2.5 on Ubuntu 16.0x. Before we begin installing Bro from source

Read More
Entity Recognition Sentiment Analysis Text Analytics Topic Modeling

Unlock the Potential of Text Analytics with Python NLTK

March 1, 2016February 4, 2023 jbower

Introduction Let’s start at the beginning. As businesses and organizations collect more data than ever, it’s essential to make sense of it so we can

Read More
CTF

SkyDog Con CTF – The Legend Begins

November 2, 2015May 9, 2022 jbower

Sky Dog Con CTF – Over but not forgotten. Download Link https://download.vulnhub.com/skydog/SkyDogCTF.ova Instructions The CTF is a virtual machine and works best in Virtual Box.

Read More
Operating Systems

Quick and Dirty: Installing Htop on FreeBSD 10.x

August 31, 2015January 27, 2023 jbower

Htop is an interactive system-monitor process-viewer written for Linux. On most of my servers I have it up and running continually if I’m not actively

Read More

Posts navigation

1 2 Next

Categories

  • CTF
  • Entity Recognition
  • Health
  • Memory Forensics
  • NIDS
  • NLP
  • Operating Systems
  • Productivity
  • Python
  • Sentiment Analysis
  • Tech
  • Text Analytics
  • Threat Hunting
  • Threat Intelligence
  • Topic Modeling
  • Twitter
  • GitHub
  • YouTube
  • LinkedIn

Videos

https://www.youtube.com/watch?v=FEb8KZoEyzI&t=1291s

Recent Posts

  • Most Popular Word Embedding Techniques for the Win
  • Python Regex Examples with Notes
  • Linux Memory Analysis: How to Start and What You Need to Know
  • Threat Profile: Killer Swag
  • Threat Hunting with Bro IDS

Tags

BERT Boot2Root Diet Dirb featured Firewall FreeBSD Hacking Hacking Challenge Htop Kioptrix LiME Monitoring NetworkMiner Nikto NLP Nmap Nokia 770 OpenBSD PCAP Peak Performance PF Productivity Quotes Security Threat Intelligence Toys Tr0ll Traffic Visualize Volatility Wireshark Word2Vec Workout

Archives

  • February 2023
  • July 2018
  • August 2017
  • June 2017
  • February 2017
  • October 2016
  • September 2016
  • March 2016
  • November 2015
  • August 2015
  • September 2014
  • August 2014
  • July 2014
  • January 2014
  • June 2013
  • August 2009
  • September 2008
    All Rights Reserved 2022.
    Proudly powered by WordPress | Theme: Fairy Blog by Candid Themes.