defense

There are 193 repositories under defense topic.

  • personal-security-checklist

    Lissy93/personal-security-checklist

    🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024

    Language:TypeScript16.8k211851.2k
  • 0x6d69636b/windows_hardening

    HardeningKitty and Windows Hardening Settings

    Language:PowerShell2.3k7260307
  • scipag/HardeningKitty

    HardeningKitty - Checks and hardens your Windows configuration

    Language:PowerShell1.3k3443153
  • zatosource/zato

    ESB, SOA, REST, APIs and Cloud Integrations in Python

    Language:Python1.1k791k240
  • DSE-MSU/DeepRobust

    A pytorch adversarial library for attack and defense methods on images and graphs

    Language:Python97416106189
  • EdisonLeeeee/Graph-Adversarial-Learning

    A curated collection of adversarial attack and defense on graph data.

    Language:Python54724379
  • chainguard-dev/osquery-defense-kit

    Production-ready detection & response queries for osquery

    Language:Makefile51711634
  • OWASP/owasp-java-encoder

    The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!

    Language:Java4855055112
  • frostbits-security/ccat

    Cisco Config Analysis Tool

    Language:Python440331396
  • gildasio/h2t

    h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply

    Language:Python39110336
  • ChandlerBang/awesome-graph-attack-papers

    Adversarial attacks and defenses on Graph Neural Networks.

  • adversarial-explainable-ai

    hbaniecki/adversarial-explainable-ai

    💡 Adversarial attacks on explanations and how to defend them

  • ChandlerBang/Pro-GNN

    Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"

    Language:Python28052445
  • eth-sri/diffai

    A certifiable defense against adversarial examples by training neural networks to be provably robust

    Language:Python21716726
  • safreita1/TIGER

    Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)

    Language:Python1514724
  • PI-Defender/pi-defender

    Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.

    Language:C++1474123
  • REW-sploit/REW-sploit

    Emulate and Dissect MSF and *other* attacks

    Language:Python1375422
  • izowave

    neki-dev/izowave

    🎲 Isometric game. Build and defend in open world

    Language:TypeScript1272732
  • boundaryx/cloudrasp-log4j2

    一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.

    Language:Java1216020
  • as791/Adversarial-Example-Attack-and-Defense

    This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defense against all attacks using MNIST dataset.

    Language:Jupyter Notebook1163226
  • limithit/ngx_dynamic_limit_req_module

    The ngx_dynamic_limit_req_module module is used to dynamically lock IP and release it periodically.

    Language:C9551124
  • cuge1995/awesome-3D-point-cloud-attacks

    List of state of the art papers, code, and other resources

  • tobor88/PowerShell-Blue-Team

    Collection of PowerShell functinos and scripts a Blue Teamer might use

    Language:PowerShell843018
  • poloclub/jpeg-defense

    SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression

    Language:Python813448
  • layumi/Awesome-Fools

    :skull: A collection of methods to fool the deep neural network :skull:

  • Haichao-Zhang/FeatureScatter

    Feature Scattering Adversarial Training (NeurIPS19)

    Language:Python713511
  • oshp/headers

    An application to catch, search and analyze HTTP secure headers.

    Language:Python643119
  • Wuziyi616/IF-Defense

    This is the official pytorch implementation for paper: IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restoration

    Language:Python6121511
  • dod-advana/gamechanger

    GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements

    Language:Shell6015519
  • J4FSec/In0ri

    Website defacement attack detection with deep learning

    Language:CSS571913
  • timlzh/webArmory

    The Web Armory | Web武器库

    Language:Python523010
  • YyzHarry/ME-Net

    [ICML 2019] ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation

    Language:Python523610
  • RobustNLP/DeRTa

    A novel approach to improve the safety of large language models, enabling them to transition effectively from unsafe to safe state.

    Language:Python50500
  • BTPS-SecPack

    OsbornePro/BTPS-SecPack

    This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding available to overly spend on security. The goal of this project is to help add value to an smaller organizations security by creating more visibility for the average IT Administrator. Organizations with 1,000’s of devices may find that this entire suite does not apply to them.

    Language:PowerShell486111
  • KaiyuanZh/FLIP

    FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning [ICLR‘23, Best Paper Award at ECCV’22 AROW Workshop]

    Language:Python42342
  • deauthalyzer

    z0m31en7/deauthalyzer

    Deauthalyzer is a script designed to monitor WiFi networks and detect deauthentication attacks. It utilizes packet sniffing and analysis techniques to identify deauthentication attack packets and provide relevant information about the attack.

    Language:Python42204