hjmark2010 Goto Github PK
Name: scpctg
Type: User
Name: scpctg
Type: User
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Academic Papers about LLM Application on Security
AI assistant, based on the GPT-3.5 model by OpenAI, designed to enhance your proficiency in writing research papers. Allows you to adapt your content to academic standards, transform bullet points into eloquent text, or enhance the quality of your writing through error detection.
Active Learning Workshop Materials
Adversarial Threat Matrix
AHRID - Analysis Hacker's Real-ID Platform
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
Static and Dynamic Android App analyzer
Detection of network traffic anomalies using unsupervised machine learning
AoiAWD-专为比赛设计,便携性好,低权限运行的EDR系统。
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.
APT & CyberCriminal Campaign Collection
Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
Arkime (formerly Moloch) is an open source, large scale, full packet capturing, indexing, and database system.
ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Forensic Artifact Collection Tool Matrix
This content is analysis and research of the data sources currently listed in ATT&CK.
Tool to discover external and internal network attack surface
文章 Attack Code 的详细全文 希望是一篇不错的云安全入门材料
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Have fun with audit log analysis :)
Automated Tactics Techniques & Procedures
CobaltStrike的相关资源汇总 / List of Awesome CobaltStrike Resources
A curated list of amazingly awesome Cybersecurity datasets
Adversarial attacks and defenses on Graph Neural Networks.
A collection of important graph embedding, classification and representation learning papers with implementations.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.