jhu-information-security-institute / NwSec
EN.650.624 Network Security
☆26Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for NwSec
- Public repository for Blockchains and Cryptocurrencies (601.641/601.441) JHU (Fall 2020)☆56Updated 3 years ago
- A collection of some interesting network security projects☆52Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆97Updated last year
- ☆133Updated 2 years ago
- Open Source SIEM (Security Information and Event Management system).☆197Updated last year
- a Machine Learning powered CSRF attacks finding tool☆26Updated 5 years ago
- Contains Attack labs☆151Updated 5 years ago
- ☆19Updated 2 years ago
- The TLS-Scanner Module from TLS-Attacker☆264Updated last week
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆20Updated 3 years ago
- A CVE Heatmap Using CalPlot☆98Updated 3 years ago
- ☆8Updated 8 months ago
- A collection of resources helpful for red vs blue team competitions☆8Updated 5 years ago
- ☆25Updated 3 years ago
- Machine Learning for Cyber Security☆28Updated 2 years ago
- A collection of resources for security data☆40Updated 6 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆107Updated this week
- ☆29Updated 6 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆65Updated 5 years ago
- My notes on various topics☆64Updated last year
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆232Updated 7 months ago
- CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆21Updated 4 years ago
- An Intrusion Detection System written in Python☆24Updated last year
- ☆29Updated 7 months ago
- Python wrapper for the API of cve-search☆115Updated 11 months ago
- My course work about basic binary exploitation.🤿☆0Updated 2 years ago
- Detailed writeups of how I solved infosec Capture The Flag (CTF) challenges☆49Updated 3 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆84Updated 7 years ago
- Synced with SGX101 gitbook.☆30Updated 11 months ago
- ☆37Updated 6 years ago