cyberdefense
There are 18 repositories under cyberdefense topic.
emalderson/ThePhish
ThePhish: an automated phishing email analysis tool
noraj/rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
mitre/engage
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
neohiro/ExploitProtection
Windows Exploit Protection Settings (Ultimate)
9QIX/Google-Cybersecurity-Certification-Notes
This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.
TheCyberArcher/SOC-Ressources
Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC and monitoring.
Jerr279/Purple_Team_Python
A Collection Of Cyber security and Hacking Scripts for Both Red and Blue team to make life a bit easier
clab60917/RAG-LLM-SOC_analyst
SOC Analyst Level 1 Replacement using RAG LLM
giadagabriele/COD-project
Cyber Offense and Defense Project - Università della Calabria
JawedCIA/ArkThor
Threat Categorization Based on Malware’s C2 Communication in PCAP file
ECCENTRIX-CA/Mandatory-Access-Control-The-Linchpin-of-Information-Security-in-Controlled-Environments
Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.
ECCENTRIX-CA/Web-Application-Firewalls
This article delves into the workings of WAF technology, provides concrete examples and use cases, and offers insights into how organizations can leverage this technology for enhanced security.
julien6/CybMASDE
A research platform to develop Cyberdefense Multi-Agent Systems combining Multi-Agent-Reinforcement Learning to assist designers to find a suited organization regarding constraints and goals
Think-Cube/AwesomeSecurity
Discover an awesome compilation of tools, libraries, and resources for robust security. From network to web security, find everything you need to enhance your security expertise.
andersonkevin/defender1312
A comprehensive Python-based network security tool designed to monitor and protect your local network. The tool provides a robust suite of features for scanning, identifying, and monitoring devices on your network, helping you detect potential intruders and suspicious activity.
blackkhawkk/Malware_Analysis
Dynamic and Static
BorisGigovic/Understanding-the-Cyber-Kill-Chain-
Lockheed Martin's Cyber Kill Chain aids in cybersecurity defense strategies.
shellwiz1337/shellwiz1337.github.io
My website