adversary
Here are 11 public repositories matching this topic...
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
-
Updated
May 8, 2025 - Jinja
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
-
Updated
Jun 14, 2023
Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
-
Updated
Apr 10, 2025 - Python
Repo containing cracked red teaming tools.
-
Updated
Mar 10, 2025 - Batchfile
Adversary Ransomware Simulation
-
Updated
Apr 23, 2025 - Go
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
-
Updated
Feb 18, 2022 - Python
Implementation of Hiding Data using Deep Networks - J Zhu
-
Updated
Feb 18, 2021 - Jupyter Notebook
RiP: RTD based (Ri)sk Aware Planner
-
Updated
Jan 24, 2023 - Python
A secure chat system that protects messages from outsiders including the service provider itself
-
Updated
May 24, 2023 - Java
Improve this page
Add a description, image, and links to the adversary topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the adversary topic, visit your repo's landing page and select "manage topics."