attack-defense
Here are 75 public repositories matching this topic...
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
-
Updated
Mar 4, 2022 - Python
A tool to analyze the network flow during attack/defence Capture the Flag competitions
-
Updated
Feb 27, 2022 - JavaScript
一个旨在通过应用场景 / 标签对 Github 红队向工具 / 资源进行分类收集,降低红队技术门槛的手册【持续更新】
-
Updated
Jan 7, 2022
Respounder detects presence of responder in the network.
-
Updated
Jun 15, 2019 - Go
网络安全 · 攻防对抗 · 蓝队清单,中文版
-
Updated
Jan 30, 2022 - HTML
Elemental - An ATT&CK Threat Library
-
Updated
Feb 10, 2022 - HTML
zBang is a risk assessment tool that detects potential privileged account threats
-
Updated
Nov 15, 2021 - C#
Atomic Purple Team Framework and Lifecycle
-
Updated
Feb 11, 2021
-
Updated
Dec 12, 2018
-
Updated
Sep 28, 2020 - Python
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
-
Updated
Jul 14, 2021 - Python
-
Updated
Mar 17, 2022 - CSS
Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
-
Updated
Jun 8, 2019 - Python
-
Updated
Oct 9, 2021 - C#
Pure-python distributable Attack-Defence CTF platform, created to be easily set up.
-
Updated
Feb 8, 2022 - Python
RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
-
Updated
Nov 5, 2020 - Python
FAUST Gameserver for attack-defense CTFs
-
Updated
Feb 26, 2022 - Python
A framework that help to create CTF Attack with Defense competition quickly
-
Updated
Oct 29, 2018 - Python
RuCTFE 2019. Developed with
-
Updated
Nov 28, 2021 - Python
PHDays Online CTF 2017. Developed with
-
Updated
May 13, 2017 - C
DARPA's Cyber Assured Systems Engineering (CASE) project named Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT)
-
Updated
Mar 18, 2022 - Java
Workshop Materials from DEFCON 25 (7/27/2017)
-
Updated
Jul 31, 2017
Asynchronous exploit farm for attack-defence CTF
-
Updated
Nov 8, 2018 - Python
HITB SECCONF EDU CTF 2021. Developed with
-
Updated
Aug 28, 2021 - JavaScript
Fail2Ban setup that monitors UFW logs to detect and dynamically blacklist systems that are port-probing your server. Also monitors SSH as normal.
-
Updated
Feb 2, 2022 - Shell
RuCTF 2019. Developed with
-
Updated
Nov 28, 2021 - HTML
Attack & Defense CTF Farm based on DestructiveFarm
-
Updated
Dec 15, 2021 - Python
-
Updated
Mar 14, 2022 - Python
Improve this page
Add a description, image, and links to the attack-defense topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the attack-defense topic, visit your repo's landing page and select "manage topics."


Hello, what happen if victim mashine only can using outgoing port 443 and 80 ? And did it using ssh ? What happen if intrusion detection system is enabled? They will see your service?