defense
There are 206 repositories under defense topic.
Lissy93/personal-security-checklist
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
0x6d69636b/windows_hardening
HardeningKitty and Windows Hardening Settings
scipag/HardeningKitty
HardeningKitty - Checks and hardens your Windows configuration
zatosource/zato
ESB, SOA, REST, APIs and Cloud Integrations in Python
DSE-MSU/DeepRobust
A pytorch adversarial library for attack and defense methods on images and graphs
EdisonLeeeee/Graph-Adversarial-Learning
A curated collection of adversarial attack and defense on graph data.
chainguard-dev/osquery-defense-kit
Production-ready detection & response queries for osquery
OWASP/owasp-java-encoder
The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!
frostbits-security/ccat
Cisco Config Analysis Tool
gildasio/h2t
h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply
ChandlerBang/awesome-graph-attack-papers
Adversarial attacks and defenses on Graph Neural Networks.
hbaniecki/adversarial-explainable-ai
💡 Adversarial attacks on explanations and how to defend them
ChandlerBang/Pro-GNN
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
eth-sri/diffai
A certifiable defense against adversarial examples by training neural networks to be provably robust
safreita1/TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
PI-Defender/pi-defender
Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.
neki-dev/izowave
🎲 Isometric game. Build and defend in open world
REW-sploit/REW-sploit
Emulate and Dissect MSF and *other* attacks
git-disl/awesome_LLM-harmful-fine-tuning-papers
A survey on harmful fine-tuning attack for large language model
as791/Adversarial-Example-Attack-and-Defense
This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defense against all attacks using MNIST dataset.
boundaryx/cloudrasp-log4j2
一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
cuge1995/awesome-3D-point-cloud-attacks
List of state of the art papers, code, and other resources
limithit/ngx_dynamic_limit_req_module
The ngx_dynamic_limit_req_module module is used to dynamically lock IP and release it periodically.
tobor88/PowerShell-Blue-Team
Collection of PowerShell functinos and scripts a Blue Teamer might use
poloclub/jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
layumi/Awesome-Fools
:skull: A collection of methods to fool the deep neural network :skull:
Haichao-Zhang/FeatureScatter
Feature Scattering Adversarial Training (NeurIPS19)
dod-advana/gamechanger
GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
timlzh/webArmory
The Web Armory | Web武器库
oshp/headers
An application to catch, search and analyze HTTP secure headers.
stratosphereips/stratocyberlab
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
Wuziyi616/IF-Defense
This is the official pytorch implementation for paper: IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restoration
J4FSec/In0ri
Website defacement attack detection with deep learning
RobustNLP/DeRTa
A novel approach to improve the safety of large language models, enabling them to transition effectively from unsafe to safe state.
YyzHarry/ME-Net
[ICML 2019] ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation
z0m31en7/deauthalyzer
Deauthalyzer is a script designed to monitor WiFi networks and detect deauthentication attacks. It utilizes packet sniffing and analysis techniques to identify deauthentication attack packets and provide relevant information about the attack.