Here are
75 public repositories
matching this topic...
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
Updated
Mar 4, 2022
Python
A tool to analyze the network flow during attack/defence Capture the Flag competitions
Updated
Feb 27, 2022
JavaScript
一个旨在通过应用场景 / 标签对 Github 红队向工具 / 资源进行分类收集,降低红队技术门槛的手册【持续更新】
Respounder detects presence of responder in the network.
Updated
Jan 30, 2022
HTML
Elemental - An ATT&CK Threat Library
Updated
Feb 10, 2022
HTML
zBang is a risk assessment tool that detects potential privileged account threats
Atomic Purple Team Framework and Lifecycle
🚩 A framework for CTF Attack with Defense Mode
🔨 A multiple reverse shell session/client manager via terminal
Updated
Sep 28, 2020
Python
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Updated
Jul 14, 2021
Python
📢 🔒 Exploit manager for attack-defense CTF competitions
Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Updated
Jun 8, 2019
Python
Vulnerability Recurrence:漏洞复现记录
Updated
Dec 9, 2019
Python
Pure-python distributable Attack-Defence CTF platform, created to be easily set up.
Updated
Feb 8, 2022
Python
RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Updated
Nov 5, 2020
Python
FAUST Gameserver for attack-defense CTFs
Updated
Feb 26, 2022
Python
A framework that help to create CTF Attack with Defense competition quickly
Updated
Oct 29, 2018
Python
RuCTFE 2019. Developed with ♥ by HackerDom team
Updated
Nov 28, 2021
Python
PHDays Online CTF 2017. Developed with ♥ by Hackerdom team
DARPA's Cyber Assured Systems Engineering (CASE) project named Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT)
Updated
Mar 18, 2022
Java
Workshop Materials from DEFCON 25 (7/27/2017)
Asynchronous exploit farm for attack-defence CTF
Updated
Nov 8, 2018
Python
HITB SECCONF EDU CTF 2021. Developed with ❤️ by Hackerdom team and HITB.
Updated
Aug 28, 2021
JavaScript
Fail2Ban setup that monitors UFW logs to detect and dynamically blacklist systems that are port-probing your server. Also monitors SSH as normal.
Updated
Feb 2, 2022
Shell
RuCTF 2019. Developed with ♥ by Hackerdom team
Updated
Nov 28, 2021
HTML
Attack & Defense CTF Farm based on DestructiveFarm
Updated
Dec 15, 2021
Python
✅ CTF participation Telegram Bot
Updated
Mar 14, 2022
Python
Improve this page
Add a description, image, and links to the
attack-defense
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
attack-defense
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
Hello, what happen if victim mashine only can using outgoing port 443 and 80 ? And did it using ssh ? What happen if intrusion detection system is enabled? They will see your service?