ThePhish: an automated phishing email analysis tool
-
Updated
Aug 1, 2024 - Python
ThePhish: an automated phishing email analysis tool
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
Windows Exploit Protection Settings (Ultimate)
This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.
Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC and monitoring.
SOC Analyst Level 1 Replacement using RAG LLM
A Collection Of Cyber security and Hacking Scripts for Both Red and Blue team to make life a bit easier
Top-common-usernames
Cyber Offense and Defense Project - Università della Calabria
Threat Categorization Based on Malware’s C2 Communication in PCAP file
A comprehensive Python-based network security tool designed to monitor and protect your local network. The tool provides a robust suite of features for scanning, identifying, and monitoring devices on your network, helping you detect potential intruders and suspicious activity.
In this article, we explore the role of OSINT (Open-Source Intelligence) in computer security. Learn how OSINT leverages publicly available data to identify threats, assess vulnerabilities, and enhance incident response, along with best practices and tools for effective implementation.
A machine learning system for detecting data exfiltration attempts
Lockheed Martin's Cyber Kill Chain aids in cybersecurity defense strategies.
My website
Cybersecurity for the modern AI age. GovTech, Cyber Defense, Office, Ethical Hacking. Tools, tips and tricks, how-to guides, configurations, recommended configurations and baselines.
Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.
This article delves into the workings of WAF technology, provides concrete examples and use cases, and offers insights into how organizations can leverage this technology for enhanced security.
SERDUX-MARCIM: Maritime cyberattack simulation using compartmental models in epidemiology and agent-based modeling
Add a description, image, and links to the cyberdefense topic page so that developers can more easily learn about it.
To associate your repository with the cyberdefense topic, visit your repo's landing page and select "manage topics."