Topic: cyberattack Goto Github
Some thing interesting about cyberattack
Some thing interesting about cyberattack
cyberattack,This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".
User: abc744587
cyberattack,Small collection of Ransomwares.
User: aktechnohacker
cyberattack,sort of a back up for MORAN blog for now
User: alvin-tosh
Home Page: https://alvingitonga14.wixsite.com/moran
cyberattack,Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
User: anish-m-code
cyberattack,Cyber Attack Detection thanks to Machine Learning Algorithms
User: antoinedelplace
Home Page: https://arxiv.org/abs/2001.06309
cyberattack,InsightMonitor is a comprehensive system monitoring solution designed to provide real-time insights into various aspects of system performance and resource utilization. It works by deploying lightweight agents on monitored systems to continuously collect data on key metrics such as CPU usage, memory utilization, disk activity, and network traffic.
User: aryan-parashar
cyberattack,The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
Organization: cscrc-screed
cyberattack,The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
Organization: cscrc-screed
cyberattack,Robust regression for electricity demand forecasting against cyberattacks
User: danielvandh
cyberattack,The main repository for our DE project! This website will be hosted using GitHub pages. Our plan is to make a website which anyone can visit in case or for prevention of cyber attacks.
User: dhiral2908
Home Page: https://dhiral2908.github.io/Cyber-identity-awareness/
cyberattack,This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.
Organization: eccentrix-ca
cyberattack,Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
User: eightus
cyberattack,Framework for P300 wave detection and noise-based cyberattacks in Brain-Computer Interfaces - Enrique Tomás Martínez Beltrán
User: enriquetomasmb
cyberattack,This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
User: evyatar9
cyberattack,implement of ML-based anomaly detection models to identify cyberattacks from NetFlow data
User: heewon-hailey
cyberattack,Exploring cyber attacks
User: henrywoody
cyberattack,Summary: The Cybersecurity and Infrastructure Security Agency CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. In response to the Russian Invasion of Ukraine, CISA has been closely monitoring the increased malicious cyber activity and has developed strategies to help mitigate the risk to organizations.
User: joshblack07
cyberattack,A curated list of awesome cyber attacks in iran, we want to review and explain some advanced attack that happened in iran, in order to learned some security tips.
User: kh4sh3i
cyberattack,A .NET Standard library for pentesting web apps against credential stuffing attacks.
User: laiteux
cyberattack,Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
User: leoisrael
cyberattack,🛡️ This project aims to detect malware embedded within QR codes, assisting law enforcement in scanning public QR codes, such as those found in subways and other public areas. 🏙️ It enhances public safety by identifying potentially malicious QR codes before they can cause harm. 🚨
User: loai-houmane
cyberattack,Tarefas com o uso de inteligência artificial para detecção de anomalias e ataques adversariais, fazer testes de modelos, hiperparâmetros e produzir relatórios. Tarefas da cadeira de Detecção de Intrusão do curso de Engenharia da Computação (EC) do CIn da UFPE, cadeira cursada por mim de 2023 a 2024.
User: luiz-linkezio
cyberattack,This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
User: mayankfawkes
cyberattack,Best Tools For DoS
User: mr-pstar7
cyberattack,A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
User: mytechnotalent
cyberattack,Safety Backup System is a project complete of Client, Server and Remote Access software, developed to improve security of users. It's extremely useful to prevent data loss in case of cyberattack or hardware malfunction. SBS can backup computer files and send them to a remote server or store them in an external device.
User: nicholasmarasco95
cyberattack,Resources for Threat Analysis, Security Testing, Penetration Processes, Attacks, and Investigation
User: overthenet
cyberattack,An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.
User: paulveillard
cyberattack,A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
User: paulveillard
cyberattack,An ongoing collection of Python language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.
User: paulveillard
cyberattack,An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
User: paulveillard
cyberattack,A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.
User: paulveillard
cyberattack,Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks
Organization: qeeqbox
cyberattack,Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
Organization: qeeqbox
cyberattack,🛡 A brief introduction and theoretical research of computer virus weapons, and the simulation of its basic framework and functions.
User: rc-w024
Home Page: https://arxiv.org/abs/2306.17508
cyberattack,Aggregation of lists of malicious IP addresses, to be blocked in the WAN > LAN direction, integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables
User: romainmarcoux
Home Page: https://www.linkedin.com/in/romainmarcoux/
cyberattack,This module queries the SentryPeer Phone Number API when making outbound calls from your FreePBX system to help prevent VoIP cyberattacks, fraudulent VoIP phone calls (toll fraud) and improve cybersecurity by detecting early stage reconnaissance attempts.
Organization: sentrypeer
cyberattack,Fraud Detection for VoIP. Use SentryPeer® HQ to help prevent VoIP cyberattacks and fraudulent VoIP phone calls (toll fraud) at https://sentrypeer.com
Organization: sentrypeer
Home Page: https://sentrypeer.com
cyberattack,To use the UNSW-NB15 data set to classify cyber attack. It is an IoT-based dataset that contains network traffic captured by a residential gateway.
User: sherinbk
cyberattack,Relational Graph Visualization with (React-D3 - Python Flask - OrientDB (NoSQL))
User: thelin90
cyberattack,Simulate mixed traffic on a ring road to analyze interactions between human-driven and ACC-equipped vehicles under various conditions, including disruptions.
User: tianyi17
cyberattack,Cyber Attacks Mitigation
User: txuswashere
cyberattack,This repository contains the code for paper, ''Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles"
User: uamughal
Home Page: https://ieeexplore.ieee.org/abstract/document/10288962
cyberattack,This repository contains the code for paper, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge"
User: uamughal
Home Page: https://ieeexplore.ieee.org/abstract/document/10289001
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.