Describes a number of known test resources into a ring-fenced environment in order to test cyber security monitoring tools.
-
Updated
Apr 22, 2020 - HCL
Describes a number of known test resources into a ring-fenced environment in order to test cyber security monitoring tools.
Open Source Cyber Security Engine for competition
Matt (@OnlyAMedic) - Incident Response, Threat Hunting, Penetration Testing, Red Teaming - United States | https://dastinia.io
Spawn a reverse tcp shell
Open source Script tools for windows / Linux
Новицкий Никита (6231-010402D) Машинное обучение для задач информационной безопасности (магистры). Лабораторная работа №1
here are all attachments with the Intelligence posts on my Arabic blog https://abdullah-qahtani.com/9kAEhrTbP/weekly-intelligence-or-almlkhsat-alasbwayh-llahdath-alsybranyh
Third Year Information Technology (2019 Course)- 314458: Lab Practice –II (Cyber Security)
DDoS-Detection project.
Pixel Manipulation for Image Encryption
Kaspersky TIP unofficial API for Python
virus.exchange wrapper for python
It is python tool to create phishing page that could work within network and outside the network. It is only ofr educational purpose.
This project focuses on utilising external adversary nodes with passive listening to accurately detect IDS positions in Underwater Acoustic Networks (UWANs), while mapping network topology and identifying potential blind spots for strategic vulnerability exploitation.
Cybersecurity for the modern AI age. GovTech, Cyber Defense, Office, Ethical Hacking. Tools, tips and tricks, how-to guides, configurations, recommended configurations and baselines.
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."