jhu-information-security-institute / NwSec
EN.650.624 Network Security
☆26Updated 9 months ago
Alternatives and similar repositories for NwSec:
Users that are interested in NwSec are comparing it to the libraries listed below
- A collection of resources helpful for red vs blue team competitions☆9Updated 5 years ago
- This is a Forensics Report made after a thorough digital examination of the Jeans Case Evidence Image.☆17Updated 4 years ago
- This scoreboard allows you to host your own cybersecurity capture-the-flag (jeopardy-style or attack/defend) competition. Also includes t…☆53Updated this week
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆86Updated last year
- Challenge repo from TAMUctf 2019☆46Updated 5 years ago
- Contains Attack labs☆151Updated 5 years ago
- A simple virtual lab builder/player☆30Updated this week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- The aim of this repository is to help students prepare for jobs in the Security Domain by consolidating useful resources and summarizing …☆24Updated 2 years ago
- Cyber Range Automated Construction Kit☆14Updated 4 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆109Updated last month
- Machine Learning for Cyber Security☆28Updated 3 years ago
- A collection of resources for security data☆40Updated 7 years ago
- A collection of some interesting network security projects☆57Updated 6 years ago
- In service of posteriority☆43Updated 2 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆33Updated 7 years ago
- APT & CyberCriminal Campaign Collection☆15Updated 6 years ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆75Updated last year
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆7Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆29Updated 8 years ago
- An ongoing list of virtual cybersecurity conferences.☆116Updated 3 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆136Updated last year
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- Source code for my books☆158Updated last year
- A MAL language that demonstrates the Maven project structure☆23Updated 2 years ago
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆90Updated 8 months ago
- Python wrapper for the API of cve-search☆116Updated last year
- ☆30Updated 6 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆67Updated 7 months ago