🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
-
Updated
Jun 11, 2024 - TypeScript
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
HardeningKitty and Windows Hardening Settings
ONYX: Cisco Automated Assessment and Auditing Tool (CAAAT). An open-source tool that automatically assesses and audits Cisco IOS routers against Center for Internet Security (CIS) Cisco IOS 15 Benchmark and Cisco IOS 17 Benchmark.
Feature Scattering Adversarial Training (NeurIPS19)
This project is a simple example of using Stem and Scapy together to create an anonymized network analysis tool. The application can connect to a running Tor process or start a new one, send network packets through the Tor network, and rotate identities.
ESB, SOA, REST, APIs and Cloud Integrations in Python
Production-ready detection & response queries for osquery
GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
My IT defense required that I write an essay which would be 250 words long. As a fun idea, I decided to make a word counter which would simply help me count the length of the text.
A secure password manager application to safely store, modify and remove an end-user’s data and personal information.
An Open Source game using Unity where you spawn Llamas to defend a chicken coop against spooky snakes and fiendish foxes
his repository contains an implementation for eliminating backdoor triggers embedded in images, particularly addressing poison label attacks such as Trojan, BadNets, and Blend.
Automates IP address processing using IPInfo or IBM X-Force API and returns in IPADDRESS[COUNTRY:ORGANIZATION:HOSTNAME] format. It accepts a wordlist or uses netstat to capture foreign addresses; it also checks for any blacklisted IP addresses using Cisco Talos or from your own blacklist file.
A Survey of Poisoning Attacks and Defenses in Recommender Systems
official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Information Sciences, 2024
A pytorch adversarial library for attack and defense methods on images and graphs
Add a description, image, and links to the defense topic page so that developers can more easily learn about it.
To associate your repository with the defense topic, visit your repo's landing page and select "manage topics."