In0riDefacement detection with deep learning
gamechanger-dataGAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
shellsumA defense tool - detect web shells in local directories via md5sum
BTPS-SecPackThis repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
TIGERPython toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
REW-sploitEmulate and Dissect MSF and *other* attacks
gamechangerGAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
cloudrasp-log4j2一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
PortforgeLightweight utility to fool port scanners
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
SWELFSimple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Pro-GNNImplementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
satellite-placementGroup satellites into constellations such that their average observation coverage is maximized
headersAn application to catch, search and analyze HTTP secure headers.
EAD AttackEAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
alldaydevops-aismAll Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)