defense
There are 193 repositories under defense topic.
Lissy93/personal-security-checklist
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
0x6d69636b/windows_hardening
HardeningKitty and Windows Hardening Settings
scipag/HardeningKitty
HardeningKitty - Checks and hardens your Windows configuration
zatosource/zato
ESB, SOA, REST, APIs and Cloud Integrations in Python
DSE-MSU/DeepRobust
A pytorch adversarial library for attack and defense methods on images and graphs
EdisonLeeeee/Graph-Adversarial-Learning
A curated collection of adversarial attack and defense on graph data.
chainguard-dev/osquery-defense-kit
Production-ready detection & response queries for osquery
OWASP/owasp-java-encoder
The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!
frostbits-security/ccat
Cisco Config Analysis Tool
gildasio/h2t
h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply
ChandlerBang/awesome-graph-attack-papers
Adversarial attacks and defenses on Graph Neural Networks.
hbaniecki/adversarial-explainable-ai
💡 Adversarial attacks on explanations and how to defend them
ChandlerBang/Pro-GNN
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
eth-sri/diffai
A certifiable defense against adversarial examples by training neural networks to be provably robust
safreita1/TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
PI-Defender/pi-defender
Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.
REW-sploit/REW-sploit
Emulate and Dissect MSF and *other* attacks
neki-dev/izowave
🎲 Isometric game. Build and defend in open world
boundaryx/cloudrasp-log4j2
一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
as791/Adversarial-Example-Attack-and-Defense
This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defense against all attacks using MNIST dataset.
limithit/ngx_dynamic_limit_req_module
The ngx_dynamic_limit_req_module module is used to dynamically lock IP and release it periodically.
cuge1995/awesome-3D-point-cloud-attacks
List of state of the art papers, code, and other resources
tobor88/PowerShell-Blue-Team
Collection of PowerShell functinos and scripts a Blue Teamer might use
poloclub/jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
layumi/Awesome-Fools
:skull: A collection of methods to fool the deep neural network :skull:
Haichao-Zhang/FeatureScatter
Feature Scattering Adversarial Training (NeurIPS19)
oshp/headers
An application to catch, search and analyze HTTP secure headers.
Wuziyi616/IF-Defense
This is the official pytorch implementation for paper: IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restoration
dod-advana/gamechanger
GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
J4FSec/In0ri
Website defacement attack detection with deep learning
timlzh/webArmory
The Web Armory | Web武器库
YyzHarry/ME-Net
[ICML 2019] ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation
RobustNLP/DeRTa
A novel approach to improve the safety of large language models, enabling them to transition effectively from unsafe to safe state.
OsbornePro/BTPS-SecPack
This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding available to overly spend on security. The goal of this project is to help add value to an smaller organizations security by creating more visibility for the average IT Administrator. Organizations with 1,000’s of devices may find that this entire suite does not apply to them.
KaiyuanZh/FLIP
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning [ICLR‘23, Best Paper Award at ECCV’22 AROW Workshop]
z0m31en7/deauthalyzer
Deauthalyzer is a script designed to monitor WiFi networks and detect deauthentication attacks. It utilizes packet sniffing and analysis techniques to identify deauthentication attack packets and provide relevant information about the attack.