Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack threat
attack
x
threat
x
39 search results found
Aptnotes
⭐
3,352
Various public documents, whitepapers and articles about APT campaigns
Apt_cybercriminal_campagin_collections
⭐
3,307
APT & CyberCriminal Campaign Collection
Hayabusa
⭐
1,800
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Cti
⭐
1,561
Cyber Threat Intelligence Repository expressed in STIX 2.0
Advmlthreatmatrix
⭐
904
Adversarial Threat Landscape for AI Systems
Opensquat
⭐
576
The openSquat project is an open-source solution for detecting phishing domains and domain squatting. It searches for newly registered domains that impersonate legitimate domains on a daily basis.
Incubator Spot
⭐
339
Mirror of Apache Spot
Drawio Threatmodeling
⭐
264
Draw.io libraries for threat modeling diagrams
Open Network Insight
⭐
187
ONI development has been moved into Apache Software Foundation - Apache Spot (incubating) http://spot.apache.org/
Pie
⭐
147
📫 The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365
Misp Maltego
⭐
145
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Dfak
⭐
109
The Digital First Aid Kit has moved to Gitlab:
Cloudflare Block
⭐
78
Bash script that automatically activates Cloudflare's "I'm Under Attack!" mode if the server detects an attack.
Secacademic
⭐
64
记录我的安全学术学习
Phr Model
⭐
59
Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC
Chrome_extension
⭐
52
Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.
Robustml
⭐
48
Interfaces for defining Robust ML models and precisely specifying the threat models under which they claim to be secure.
Ens Adv Train Attack
⭐
30
Circumventing the defense in "Ensemble Adversarial Training: Attacks and Defenses"
Crimeware In The Modern Era
⭐
28
Paper and Links to Crimeware in the Modern Era
Befree
⭐
23
Website Security, Antivirus & Firewall || a powerful application that can secure your website against hackers, attacks and other incidents of abuse
Pinokyo
⭐
21
🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy
Zesecurity
⭐
19
A ZF2 module that adds an out of the box security layer for your applications based on PHPIDS.
Defi Sec
⭐
16
Decentralized Finance threats, attack vectors, and mitigation strategies resource repo
Bigseclist
⭐
13
A large repository of links spanning all topics in information security.
Interview_tips
⭐
12
Summary of Cyber Security interview questions I have been through, hope this helps
Act
⭐
11
ACT documentation repo
Threat Hunters Rpg
⭐
10
An interactive way to learn threat modeling
Covid 19 Cti
⭐
9
A collection of Covid-19 related threat intelligence and resources.
Network_based_mitre_attack_matrix
⭐
9
Cdas
⭐
8
This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attack execution, and cybersecurity policy analysis.
Human_threat_model
⭐
8
Gleipnir
⭐
7
An Android App sandbox threat
Tr 05 Api Module
⭐
7
Threat Response API Module
Ictm
⭐
6
A user-first approach to threat modeling.
Sidechannelattack_mitigation
⭐
5
Side Channel Attack mitigation on the hypervisor level
Wts
⭐
5
Scenario-based WiFi Network Threat Simulation
Attack Trees In Monoidal Cats
⭐
5
Project Repository: CRII: SHF: A New Foundation for Attack Trees Based on Monoidal Categories
Spot Docker
⭐
5
Threatmodel_with_drawio
⭐
5
CSV to Draw.io threat modeling converter - ish
Informationsecurity
⭐
5
App security is one of my key aspect of any application. In last few years my focus on security is gone up. Tons of learning and exciting experiments.
Related Searches
Python Attack (2,303)
Javascript Attack (693)
Attack Adversarial (590)
Security Attack (536)
C Attack (491)
Python Threat (438)
Java Attack (408)
Security Threat (258)
1-39 of 39 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.