Here are
7 public repositories
matching this topic...
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
-
Updated
Mar 21, 2022
-
Jinja
Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
-
Updated
Mar 18, 2022
-
Python
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
Lipschitz margin to improve ANN against noisy input
-
Updated
May 30, 2018
-
Jupyter Notebook
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
-
Updated
Feb 18, 2022
-
Python
A secure chat system that protects messages from outsiders including the service provider itself
Implementation of Hiding Data using Deep Networks - J Zhu
-
Updated
Feb 18, 2021
-
Jupyter Notebook
Improve this page
Add a description, image, and links to the
adversary
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
adversary
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.