Simple script to implement protections against speculative execution side-channel vulnerabilities in Windows systems.
-
Updated
Jul 22, 2023 - PowerShell
Simple script to implement protections against speculative execution side-channel vulnerabilities in Windows systems.
Bachelor's thesis for BSc Computer Engineering at University of Pisa, about an implementation of "KAISER" mitigation against Meltdown in a didactic kernel
Vale9 : Reclaim your freedom with a seizure management headband. Coming Q3 2022. #Epilepsy #Neurology #Mitigation #Forecasting #Wearable
CVE-2021-44228 log4j mitigation using aws wafv2 with ansible
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling
Detecting and Mitigating Self Contradictory Hallucinations in LLMs using 2 approaches
Contains many network security projects built on Cisco lab equipment. Each project will feature a topology diagram and description, a step by step intentional attack on the network and a step by step mitigation process.
Powershell Module to help manage ADObject ownership in Active Directory
This is a Test tool i made for a DDOS Detector. It captures packets and shows them on a web application interface. It was a part of my 2ND SEMESTER Object Oriented Project "FIXER BOTNET"
📘🛠️My self-described "Blue Team Library". A collection of scripts I've used over time to remediate various vulnerabilites.
Collected data concerning COVID-19 in Germany and a simple two-population model optimisation procedure
Security assessment of a RESTful distributed computing application. I acted as a cybersecurity consultant, identifying vulnerabilities and providing a mitigation plan. (Software Security course project)
Exploiting, Assessment, Analysis, and Hardening of a Vulnerable System
The provided scripts, DDoSDefender.go and DDoSDefender.py, are basic rate limiting implementations. They can be useful for simple scenarios where you want to limit the rate at which certain actions or requests can occur. However, whether these scripts are "good" or suitable for your specific use case depends on several factors:
Carbon footprint calculator for large scale digital investments (country or city scale).
This project is a personal learning, so you will find errors or disorganization :)
Analyses to estimate power to detect differences in the number of shark bites on humans with/without shark management strategies in place
Cyber Attacks Mitigation
This repository contains results of vulnerability analyses from NVD database performed by cybersecurity students at Wrocław University of Science and Technology
Add a description, image, and links to the mitigation topic page so that developers can more easily learn about it.
To associate your repository with the mitigation topic, visit your repo's landing page and select "manage topics."