ThePhish: an automated phishing email analysis tool
-
Updated
Aug 1, 2024 - Python
ThePhish: an automated phishing email analysis tool
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
Windows Exploit Protection Settings (Ultimate)
This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.
Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC and monitoring.
SOC Analyst Level 1 Replacement using RAG LLM
A Collection Of Cyber security and Hacking Scripts for Both Red and Blue team to make life a bit easier
Threat Categorization Based on Malware’s C2 Communication in PCAP file
Cyber Offense and Defense Project - Università della Calabria
A comprehensive Python-based network security tool designed to monitor and protect your local network. The tool provides a robust suite of features for scanning, identifying, and monitoring devices on your network, helping you detect potential intruders and suspicious activity.
A machine learning system for detecting data exfiltration attempts
Lockheed Martin's Cyber Kill Chain aids in cybersecurity defense strategies.
Cybersecurity for the modern AI age. GovTech, Cyber Defense, Office, Ethical Hacking. Tools, tips and tricks, how-to guides, configurations, recommended configurations and baselines.
My website
This article delves into the workings of WAF technology, provides concrete examples and use cases, and offers insights into how organizations can leverage this technology for enhanced security.
SERDUX-MARCIM: Maritime cyberattack simulation using compartmental models in epidemiology and agent-based modeling
Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.
Dynamic and Static
A research platform to develop Cyberdefense Multi-Agent Systems combining Multi-Agent-Reinforcement Learning to assist designers to find a suited organization regarding constraints and goals
Add a description, image, and links to the cyberdefense topic page so that developers can more easily learn about it.
To associate your repository with the cyberdefense topic, visit your repo's landing page and select "manage topics."