Skip to content
View sei-dupdyke's full-sized avatar
🤔
🤔

Block or report sei-dupdyke

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Baseline localization and classification models for the xView 2 challenge.

Python 212 88 Updated Jul 26, 2023

A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.

Smarty 14 5 Updated Jul 17, 2024

Valkyrie Framework is an open source suite of tools that enable hunt teams to locate and identify hidden cybersecurity threats lurking in network traffic.

Python 7 Updated Feb 13, 2025

Python Mattermost Driver for APIv4

Python 190 74 Updated Sep 21, 2023

Evals is a framework for evaluating LLMs and LLM systems, and an open-source registry of benchmarks.

Python 15,574 2,671 Updated Dec 18, 2024

Range and simulation tools for executing realistic training and exercise events

C# 1 2 Updated Jun 15, 2023

DNS Tunneling using powershell to download and execute a payload. Works in CLM.

Python 218 35 Updated May 24, 2022

OpenSpiel is a collection of environments and algorithms for research in general reinforcement learning and search/planning in games.

C++ 4,400 963 Updated Feb 27, 2025

GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise

C# 546 71 Updated Feb 22, 2025

President's Cup Cybersecurity Competition Challenges

PLpgSQL 162 37 Updated Feb 19, 2025

A DNS library written in C#

C# 419 128 Updated Jun 6, 2024

PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs

PowerShell 46 8 Updated Dec 4, 2024

A virtual appliance for building cyber labs, challenges and competitions

Shell 23 6 Updated Feb 27, 2025

A (nearly) production ready Dockered MISP

Shell 231 93 Updated Jan 12, 2024

SEER is a platform for assessing the performance of cybersecurity training and exercise participants.

JavaScript 7 Updated Mar 26, 2024

Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana

Shell 292 42 Updated Sep 27, 2024

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

Go 2,510 362 Updated Jul 10, 2024

Passive service locator, a python sniffer that identifies servers, clients, names and much more

Python 250 51 Updated Feb 16, 2023

GHOSTS Animator is a library and API for generating realistic NPCs for training and exercise.

C# 25 6 Updated Feb 21, 2024

© Copyright Header is a utility to manipulate software licenses on source code.

Ruby 180 59 Updated Jan 22, 2024

Detailed and tailored guide for undergraduate students or anybody want to dig deep into the field of AI with solid foundation.

7,501 1,057 Updated Mar 14, 2024

Repository for the Tetrad Project, www.phil.cmu.edu/tetrad.

Java 417 114 Updated Feb 24, 2025

A python-based chatbot for Mattermost (http://www.mattermost.org).

Python 275 103 Updated Feb 17, 2025

A browser based code editor

JavaScript 41,550 3,673 Updated Feb 4, 2025

UI automation library for .Net

C# 2,378 381 Updated Feb 25, 2025

Adversarial Threat Landscape for AI Systems

1,066 103 Updated Apr 27, 2023

aka "Bayesian Methods for Hackers": An introduction to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view. All in pure Python ;)

Jupyter Notebook 27,215 7,903 Updated Jun 25, 2024

🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.

Python 489 88 Updated Apr 3, 2024

This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attack execution, and cybersecurity policy analysis.

Python 26 6 Updated Apr 15, 2021

SPECTRE enables GHOSTS clients to have and build individual preferences over time.

C# 20 3 Updated Jun 20, 2023
Next