☆34Apr 25, 2021Updated 4 years ago
Alternatives and similar repositories for Adversarial-Threat-Detector
Users that are interested in Adversarial-Threat-Detector are comparing it to the libraries listed below
Sorting:
- セキュリティ・キャンプ全国大会2020 オンライン B8講義資料☆18Nov 28, 2020Updated 5 years ago
- ☆11Jun 15, 2020Updated 5 years ago
- ログ分 析トレーニング用コンテンツ☆97Jul 27, 2020Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- unofficial Japanese translation of OWASP Application Security Verification Standard.☆21Feb 27, 2026Updated 3 weeks ago
- Fakeshellは仮想的なシェル環境を提供するパ ッケージです。☆14Jan 17, 2023Updated 3 years ago
- A Synology Technical Add-On for Splunk☆12Sep 3, 2024Updated last year
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- repository to research & share the "machine learning & security" articles☆20Jun 25, 2018Updated 7 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆18Apr 28, 2020Updated 5 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆815Apr 21, 2023Updated 2 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Slide decks and sample codes for a lecture of "Security Engineering", which are composed in terms of how to choose and deploy appropriate…☆29Mar 9, 2026Updated last week
- This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the dev…☆19Feb 20, 2026Updated last month
- Supervised and unsupervised self-organising maps☆12Mar 11, 2026Updated last week
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- Hands-On Reinforcement Learning with R, published by Packt☆13Oct 31, 2022Updated 3 years ago
- Run-time trojan attack on neural networks☆26Feb 8, 2019Updated 7 years ago
- A demo app vulnerable to directory traversal☆15May 3, 2020Updated 5 years ago
- A method to search for a subset of best performing items wrt black-box reward function☆15Jun 7, 2019Updated 6 years ago
- ESR三部作をReVIEW使ってEPUB/Mobi化☆30Jun 30, 2025Updated 8 months ago
- .Net Assembly loader for the GMSAPasswordReader☆19Feb 15, 2023Updated 3 years ago
- Continuous External Attack Surface Discovery & Vulnerability Scanning Across AWS Organizations — Python CDK☆13Mar 6, 2026Updated 2 weeks ago
- データ基盤で求められるセキュリティと、Microsoft Defender for SQL を使った効果的なセキュリティ対策について紹介☆21May 26, 2022Updated 3 years ago
- Simple RISC-V emulator☆16Sep 4, 2020Updated 5 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Mar 29, 2021Updated 4 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Firebase client tools for security assessment or penetration testing.☆17Dec 20, 2025Updated 3 months ago
- Pull Hashes Decryption From Online Sources Using Python☆16Jun 25, 2024Updated last year
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- POC in a Box☆17Jan 20, 2023Updated 3 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Bayesian hierarchical models for estimating spatial and temporal patterns in vegetation phenology from Landsat time series☆15Sep 6, 2017Updated 8 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 7 years ago
- Project of simple Kubernetes cluster on NanoPi NEO3 ARM64 nodes☆21Jul 21, 2022Updated 3 years ago
- A collection of various widgets I've developed for awesomewm☆13May 21, 2020Updated 5 years ago
- python socket that can send numpy arrays and ml models☆13Jun 30, 2020Updated 5 years ago
- ☆15Nov 25, 2021Updated 4 years ago