jhu-information-security-institute / NwSec
EN.650.624 Network Security
☆27Updated last week
Alternatives and similar repositories for NwSec
Users that are interested in NwSec are comparing it to the libraries listed below
Sorting:
- Contains Attack labs☆151Updated 6 years ago
- Collection of writeups on ICS/SCADA security.☆171Updated last month
- Source code for my books☆163Updated 2 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆87Updated 2 years ago
- A collection of resources helpful for red vs blue team competitions☆9Updated 5 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆41Updated 9 months ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆173Updated 4 months ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆55Updated last year
- In service of posteriority☆45Updated 2 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆312Updated 7 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆101Updated last year
- A logic-based enterprise network security analyzer☆125Updated 2 years ago
- My most recent teaching materials for 2017-2020 courses (50.574, 50.520, 51.502, 50.037).☆29Updated 5 years ago
- Malware Sandboxes & Malware Source☆93Updated 8 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆81Updated 5 years ago
- ☆139Updated 3 weeks ago
- Python scripts for Malware Bazaar☆153Updated 11 months ago
- Docker Image for CVE-Search☆108Updated 2 months ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- ☆31Updated 6 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆711Updated this week
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆124Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆236Updated last year
- zeek-scripts☆43Updated 6 years ago
- Writeups for each ctf we have partecipated☆40Updated 2 years ago
- CVE.ICU code.☆42Updated this week
- The Volatility Collaborative GUI☆242Updated this week
- Challenge repo from TAMUctf 2019☆46Updated 6 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 10 months ago