Table of Contents
- Introduction to Machine Learning in Pentesting
- Phishing Domain Detection
- Malware Detection with API Calls and PE Headers
- Malware Detection with Deep Learning
- Botnet Detection with Machine Learning
- Machine Learning in Anomaly Detection Systems
- Detecting Advanced Persistent Threats
- Evading Intrusion Detection Systems with Adversarial Machine Learning
- Bypass machine learning malware Detectors
- Best Practices for Machine Learning and Feature Engineering
- Assessments

