☆12May 9, 2022Updated 3 years ago
Alternatives and similar repositories for cryptoapi-bench
Users that are interested in cryptoapi-bench are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains all CrySL rules currently used in the crypto assistant CogniCrypt.☆16Apr 2, 2026Updated last week
- ☆12Jan 10, 2024Updated 2 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- CogniCrypt_SAST: CrySL-to-Static Analysis Compiler☆80Updated this week
- ☆59Dec 8, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated 2 months ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆19Mar 5, 2025Updated last year
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 10 months ago
- CRYLOGGER: Detecting Crypto Misuses for Android and Java Apps Dynamically☆157Feb 15, 2021Updated 5 years ago
- Static analysis tool to detect missing and incorrect error checks in C and C++ codebases without using a priori knowledge.☆19Feb 11, 2026Updated last month
- allow running docker bind volumes thru Hashicorp's NOMAD using the raw_exec driver☆13Nov 6, 2018Updated 7 years ago
- A toy WebAssembly(wasm) interpreter written in Swift☆16Jan 25, 2025Updated last year
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Oct 13, 2022Updated 3 years ago
- Privacy-Preserving Dynamic Learning of Tor Network Traffic☆10Jun 15, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Randomness testing toolkit automates running and evaluating statistical testing batteries☆18Feb 16, 2024Updated 2 years ago
- 一个简单的pdf在线压缩网站☆11Sep 16, 2021Updated 4 years ago
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- ☆11Aug 19, 2016Updated 9 years ago
- Thymeleaf samples☆17Nov 1, 2017Updated 8 years ago
- ☆10Sep 28, 2020Updated 5 years ago
- Stuff related to scraping the Code Review StackExchange☆12Jan 19, 2023Updated 3 years ago
- Static program slicer used in Symbiotic tool☆12Mar 31, 2025Updated last year
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Secure SMS: Send and receive encrypted SMS (text) messages between Android phones, to improve privacy.☆29Feb 21, 2011Updated 15 years ago
- 易书网——二手书app☆10Dec 1, 2016Updated 9 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Benchmark collection for analysis. The idea is to have a collection of projects in several languages as well as various sast applications…☆12Jan 7, 2021Updated 5 years ago
- 仿【饿了么】iOS版,swift 2.2☆13Jun 19, 2017Updated 8 years ago
- Construct a regular expression engine used the algorithm in the Compilers(second edition)☆16Jul 21, 2013Updated 12 years ago
- ☆10Aug 16, 2012Updated 13 years ago
- ☆22Mar 20, 2023Updated 3 years ago
- ☆15May 18, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- OCB-AES authenticated encryption for Python☆14Oct 22, 2021Updated 4 years ago
- Code for pFedFDA: Personalized Federated Learning via Feature Distribution Adaptation (NeurIPS 2024)☆19Nov 14, 2024Updated last year
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆131Apr 10, 2025Updated last year
- Privacy Protection Application (PPA): Code and instructions for building two tools for processing vehicle trip, or trajectory, data to pr…☆13Oct 8, 2018Updated 7 years ago
- Soot based Jimple interpreter☆14Mar 31, 2021Updated 5 years ago
- An implementation of ResNet with mixup and cutout regularizations and soft filter pruning.☆17Apr 1, 2026Updated last week