#

adversary

https://static.github-zh.com/github_avatars/rabbitstack?size=40
Go 2.38 k
6 天前
splunk/attack_range
https://static.github-zh.com/github_avatars/splunk?size=40

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Jinja 2.35 k
5 天前
https://static.github-zh.com/github_avatars/ch33r10?size=40

Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.

663
2 年前
https://static.github-zh.com/github_avatars/MISP?size=40

Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.

Python 282
6 天前
https://static.github-zh.com/github_avatars/west-wind?size=40

To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.

Python 4
4 年前
https://static.github-zh.com/github_avatars/artsiom-svm?size=40

Lipschitz margin to improve ANN against noisy input

Jupyter Notebook 1
7 年前
https://static.github-zh.com/github_avatars/arnobpl?size=40

#安全#A secure chat system that protects messages from outsiders including the service provider itself

Java 0
2 个月前
Website
Wikipedia