There are 19 repositories under attack-defense topic.
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
:hammer: A modern multiple reverse shell sessions manager written in go
网络安全 · 攻防对抗 · 蓝队清单,中文版
Chinese safety prompts for evaluating and improving the safety of LLMs. 中文安全prompts,用于评估和提升大模型的安全性。
一个旨在通过应用场景 / 标签对 Github 红队向工具 / 资源进行分类收集,降低红队技术门槛的手册【持续更新】
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
Elemental - An ATT&CK Threat Library
Respounder detects presence of responder in the network.
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Atomic Purple Team Framework and Lifecycle
📢 🔒 Exploit manager for attack-defense CTF competitions
:hammer: A multiple reverse shell session/client manager via terminal
:triangular_flag_on_post: A framework for CTF Attack with Defense Mode
Network analysis tool for Attack Defence CTF
Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Pure-python distributable Attack-Defence CTF platform, created to be easily set up.
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
prompt attack-defense, prompt Injection, reverse engineering notes and examples | 提示词对抗、破解例子与笔记
DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation of repeatable detection samples in the cloud. Built on Google Workflows
Attack & Defense CTF Farm based on DestructiveFarm
Runs exploits, fast.
FAUST Gameserver for attack-defense CTFs
DARPA's Cyber Assured Systems Engineering (CASE) project named Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT)
Fail2Ban setup that monitors UFW logs to detect and dynamically blacklist systems that are port-probing your server. Also monitors SSH as normal.
Exploit distribution system for A&D competitions
A framework that help to create CTF Attack with Defense competition quickly
RuCTFE 2019. Developed with ♥ by HackerDom team
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
PHDays Online CTF 2017. Developed with ♥ by Hackerdom team
Asynchronous exploit farm for attack-defence CTF
Workshop Materials from DEFCON 25 (7/27/2017)