-
Updated
May 26, 2020
#
defense
Here are 78 public repositories matching this topic...
open-source
checklist
security
awesome
privacy
protection
article
surveillance
cybersecurity
awesome-list
censorship
defense
security-tools
privacy-protection
data-breaches
reccomendations
digital-defense
A certifiable defense against adversarial examples by training neural networks to be provably robust
-
Updated
Mar 7, 2020 - Python
A pytorch adversarial library for attack and defense methods on images and graphs
machine-learning
deep-neural-networks
deep-learning
defense
graph-mining
graph-convolutional-networks
adversarial-examples
adversarial-attacks
graph-neural-networks
-
Updated
May 22, 2020 - Python
-
Updated
Feb 5, 2019
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
security
deep-learning
attack
tensorflow
paper
intel
dnn
shield
defense
georgia-tech
vaccination
adversarial-machine-learning
imagenet-dataset
fgsm
video-demo
jpeg-compression
carlini-wagner
i-fgsm
deepfool
-
Updated
Nov 27, 2018 - Python
Adversarial attacks and defenses on Graph Neural Networks.
machine-learning
awesome
deep-learning
graph
awesome-list
defense
robustness
literature-review
adversarial-examples
adversarial-attacks
graph-neural-networks
-
Updated
May 24, 2020
[ICML 2019] ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation
defense
matrix-completion
robustness
adversarial-example
adversarial-attacks
ml-safety
matrix-estimation
-
Updated
Apr 15, 2020 - Python
Feature Scattering Adversarial Training
-
Updated
Feb 18, 2020 - Python
An application to catch, search and analyze HTTP secure headers.
-
Updated
Oct 21, 2019 - Python
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
-
Updated
Sep 22, 2018 - Python
A defense tool - detect web shells in local directories via md5sum
-
Updated
Jul 18, 2019 - Python
Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》
-
Updated
Nov 6, 2019 - Python
devmaximilian
commented
Nov 3, 2019
Would it be possible to add support for excluding specific ports? I'm thinking this could be an additional argument passed to the script (a comma-delimited list of ports).
An example call could look like the following:
portforge.cr localhost 4440 4445 4442,4443
This would exclude ports 4442 and 4443.
The reasoning behind my feature request is that I might want to run a web server on
All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)
-
Updated
Dec 7, 2016 - Python
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
machine-learning
deep-learning
pytorch
semi-supervised-learning
defense
graph-mining
attack-defense
adversarial-attacks
graph-neural-networks
graph-structure-recovery
-
Updated
May 21, 2020 - Python
Discover "HotSpots" - potential spots for credentials theft
-
Updated
Apr 12, 2018 - PowerShell
Several self-defense shellcodes
-
Updated
Jul 16, 2019 - Assembly
A repository to showcase demonstrations, prototypes and proofs of concept from the Defense Solutions Team.
-
Updated
Sep 7, 2018 - Java
Demo for analyzing the structural imbalance on a signed social network.
-
Updated
May 22, 2020 - Python
-
Updated
May 1, 2017 - C#
This module not only limits the access rate of cookies but also limits the number of malicious ip forged cookies.
-
Updated
Feb 25, 2020 - C
Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
windows
analytics
analysis
dotnet
powershell
detection
logging
logs
cybersecurity
sysmon
siem
hunting
forwarder
defense
eventlog
log-forwarder
evtx
logging-framework
logging-agent
windowsevents
-
Updated
May 23, 2020 - C#
END OF THE WORLD
youtube
google
facebook
twitter
news
telegram
america
technology
viber
vkontakte
tv
ufo
live
artificial-intelligence
ii
defense
apocalypse
doomsday
billie-eilish
neuro-network
-
Updated
Mar 12, 2020
Improve this page
Add a description, image, and links to the defense topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the defense topic, visit your repo's landing page and select "manage topics."
MSVC on Windows prepends padding instructions to functions for alignment (it currently uses the
CCopcode for this and a 16-byte alignment for all functions by default). We currently preserve those instructions as "gap functions", but they should be safe to discard. We could add a pass that scans all gap functions and trims them by removing allCC(and even90as well) opcode.