cyberdefense
There are 22 repositories under cyberdefense topic.
emalderson/ThePhish
ThePhish: an automated phishing email analysis tool
noraj/rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
mitre/engage
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
neohiro/ExploitProtection
Windows Exploit Protection Settings (Ultimate)
9QIX/Google-Cybersecurity-Certification-Notes
This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.
TheCyberArcher/SOC-Ressources
Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC and monitoring.
clab60917/RAG-LLM-SOC_analyst
SOC Analyst Level 1 Replacement using RAG LLM
Jerr279/Purple_Team_Python
A Collection Of Cyber security and Hacking Scripts for Both Red and Blue team to make life a bit easier
AnandJogawade/Top-common-usernames
Top-common-usernames
andersonkevin/defender1312
A comprehensive Python-based network security tool designed to monitor and protect your local network. The tool provides a robust suite of features for scanning, identifying, and monitoring devices on your network, helping you detect potential intruders and suspicious activity.
giadagabriele/COD-project
Cyber Offense and Defense Project - Università della Calabria
JawedCIA/ArkThor
Threat Categorization Based on Malware’s C2 Communication in PCAP file
BorisGigovic/Understanding-the-Cyber-Kill-Chain-
Lockheed Martin's Cyber Kill Chain aids in cybersecurity defense strategies.
cyberdefense42/data_exfiltration_detection
A machine learning system for detecting data exfiltration attempts
diegocabuya/SERDUX-MARCIM
SERDUX-MARCIM: Maritime cyberattack simulation using compartmental models in epidemiology and agent-based modeling
ECCENTRIX-CA/Mandatory-Access-Control-The-Linchpin-of-Information-Security-in-Controlled-Environments
Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.
ECCENTRIX-CA/Web-Application-Firewalls
This article delves into the workings of WAF technology, provides concrete examples and use cases, and offers insights into how organizations can leverage this technology for enhanced security.
julien6/CybMASDE
A research platform to develop Cyberdefense Multi-Agent Systems combining Multi-Agent-Reinforcement Learning to assist designers to find a suited organization regarding constraints and goals
SheasTechSchool/Cybersecurity
Cybersecurity for the modern AI age. GovTech, Cyber Defense, Office, Ethical Hacking. Tools, tips and tricks, how-to guides, configurations, recommended configurations and baselines.
shellwiz1337/shellwiz1337.github.io
My website
Think-Cube/AwesomeSecurity
Discover an awesome compilation of tools, libraries, and resources for robust security. From network to web security, find everything you need to enhance your security expertise.
blackkhawkk/Malware_Analysis
Dynamic and Static