Topic: defense Goto Github
Some thing interesting about defense
Some thing interesting about defense
defense,HardeningKitty and Windows Hardening settings and configurations
User: 0x6d69636b
defense,Repo for papers to read on adversarial attack and defense techniques in the audio domain.
User: aminul-huq
defense,This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defense against all attacks using MNIST dataset.
User: as791
defense,Lightweight utility to fool port scanners
User: beyarz
defense,Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endpoints.
User: biffalo
defense,一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Organization: boundaryx
defense,Production-ready detection & response queries for osquery
Organization: chainguard-dev
defense,Adversarial attacks and defenses on Graph Neural Networks.
User: chandlerbang
defense,Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
User: chandlerbang
Home Page: https://arxiv.org/abs/2005.10203
defense,Security purchases checker & validator for Android
User: cioccarellia
defense,List of state of the art papers, code, and other resources
User: cuge1995
defense,GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Organization: dod-advana
defense,A pytorch adversarial library for attack and defense methods on images and graphs
User: dse-msu
defense,Group satellites into constellations such that their average observation coverage is maximized
Organization: dwave-examples
defense,Demo for analyzing the structural imbalance on a signed social network.
Organization: dwave-examples
defense,AntiRansomware Linux Kernel Module
User: echo-devim
defense,A curated collection of adversarial attack and defense on graph data.
User: edisonleeeee
defense,Highly customizable low-interaction experimental honeypot that mimics specific hosts.
User: edoardottt
Home Page: https://edoardoottavianelli.it
defense,A certifiable defense against adversarial examples by training neural networks to be provably robust
Organization: eth-sri
Home Page: https://arxiv.org/abs/1903.12519
defense,Cisco Config Analysis Tool
Organization: frostbits-security
defense,h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply
User: gildasio
Home Page: https://certbahia.pop-ba.rnp.br/projects/h2t/
defense,Feature Scattering Adversarial Training (NeurIPS19)
User: haichao-zhang
defense,💡 Adversarial attacks on explanations and how to defend them
User: hbaniecki
Home Page: https://doi.org/10.1016/j.inffus.2024.102303
defense,Website defacement attack detection with deep learning
Organization: j4fsec
defense,FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning [ICLR‘23, Best Paper Award at ECCV’22 AROW Workshop]
User: kaiyuanzh
Home Page: https://kaiyuanzhang.com
defense,:skull: A collection of methods to fool the deep neural network :skull:
User: layumi
defense,Various eBPF programs for tracing network connections
User: leodido
defense,🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
User: lissy93
Home Page: https://digital-defense.io
defense,A defense tool - detect web shells in local directories via md5sum
User: manhnho
defense,Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces" which is published in IEEE Transactions on Information Forensics and Security (TIFS).
User: msrocean
defense,This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding available to overly spend on security. The goal of this project is to help add value to an smaller organizations security by creating more visibility for the average IT Administrator. Organizations with 1,000’s of devices may find that this entire suite does not apply to them.
Organization: osbornepro
Home Page: https://btpssecpack.osbornepro.com
defense,An application to catch, search and analyze HTTP secure headers.
Organization: oshp
Home Page: http://oshp.bsecteam.com
defense,The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!
Organization: owasp
Home Page: https://owasp.org/www-project-java-encoder/
defense,Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.
Organization: pi-defender
Home Page: https://pi-defender.github.io/
defense,SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Organization: poloclub
Home Page: https://poloclub.github.io/jpeg-defense/
defense,Emulate and Dissect MSF and *other* attacks
Organization: rew-sploit
defense,Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
User: safreita1
Home Page: https://graph-tiger.readthedocs.io
defense,HardeningKitty - Checks and hardens your Windows configuration
Organization: scipag
defense,Collection of PowerShell functinos and scripts a Blue Teamer might use
User: tobor88
defense,This is the official pytorch implementation for paper: IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restoration
User: wuziyi616
defense,EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
User: ysharma1126
defense,[ICML 2019] ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation
User: yyzharry
Home Page: http://me-net.csail.mit.edu
defense,Deauthalyzer is a script designed to monitor WiFi networks and detect deauthentication attacks. It utilizes packet sniffing and analysis techniques to identify deauthentication attack packets and provide relevant information about the attack.
User: z0m31en7
defense,ESB, SOA, REST, APIs and Cloud Integrations in Python
User: zatosource
Home Page: https://zato.io
defense,Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》
User: zhongyy
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.