Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ransomware.
-
Updated
May 22, 2023 - Python
Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ransomware.
An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidelines. Its actionable report can assist the user in correctly and easily fixing their configurations.
Enabling 2fac confirmation for newly connected USB devices
An ongoing & curated collection of awesome web vulnerability - Server-side request forgery software practices and remediation, libraries and frameworks, best guidelines and technical resources about SSRF
This is my study on detection and mitigation DDoS attacks in SDN
A simple python script to check evil Visual Studio projects
XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identification and mitigation, serving as a valuable asset for security experts and developers.
Docker container with exploitation technique examples, used in my master thesis
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling
My assignments on GDB and Computer Architecture; Buffer Overflow; Stack Overflow and ROP gadgets; ASLR; Heap Overflow; Type Confusion; Injection Attack; Fuzzing.
Proactive Vulnerability Detection and Mitigation Leveraged by SDN.
This repository contains results of vulnerability analyses from NVD database performed by cybersecurity students at Wrocław University of Science and Technology
Mitigation for Windows date and time synchronization fail
A comprehensive fairness analysis of the Boston Residents Jobs Policy compliance data using Fairlearn to detect and mitigate bias in construction project employment
The provided scripts, DDoSDefender.go and DDoSDefender.py, are basic rate limiting implementations. They can be useful for simple scenarios where you want to limit the rate at which certain actions or requests can occur. However, whether these scripts are "good" or suitable for your specific use case depends on several factors:
Add a description, image, and links to the mitigation topic page so that developers can more easily learn about it.
To associate your repository with the mitigation topic, visit your repo's landing page and select "manage topics."