☆12May 9, 2022Updated 3 years ago
Alternatives and similar repositories for cryptoapi-bench
Users that are interested in cryptoapi-bench are comparing it to the libraries listed below
Sorting:
- ☆121Dec 27, 2022Updated 3 years ago
- ☆11Jan 10, 2024Updated 2 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- ☆59Dec 8, 2023Updated 2 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated last month
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 10 months ago
- CRYLOGGER: Detecting Crypto Misuses for Android and Java Apps Dynamically☆156Feb 15, 2021Updated 5 years ago
- Implementation example of Distributed Tensorflow☆10Jul 22, 2017Updated 8 years ago
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Oct 13, 2022Updated 3 years ago
- CogniCrypt is an Eclipse plugin that supports Java developers in using Java Cryptographic APIs.☆61Dec 13, 2024Updated last year
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- ☆11Aug 19, 2016Updated 9 years ago
- ☆15Jun 10, 2022Updated 3 years ago
- ☆10Sep 28, 2020Updated 5 years ago
- Java Desktop Client to Evernote☆32Mar 9, 2016Updated 10 years ago
- Stuff related to scraping the Code Review StackExchange☆12Jan 19, 2023Updated 3 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- Static program slicer used in Symbiotic tool☆12Mar 31, 2025Updated 11 months ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- Blockchain and Smart Contract basic code for "mining" myself !!!☆13Jun 6, 2022Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Benchmark collection for analysis. The idea is to have a collection of projects in several languages as well as various sast applications…☆12Jan 7, 2021Updated 5 years ago
- 仿【饿了么】iOS版,swift 2.2☆13Jun 19, 2017Updated 8 years ago
- ☆10Aug 16, 2012Updated 13 years ago
- ☆22Mar 20, 2023Updated 3 years ago
- ☆15May 18, 2019Updated 6 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- OCB-AES authenticated encryption for Python☆14Oct 22, 2021Updated 4 years ago
- Code for pFedFDA: Personalized Federated Learning via Feature Distribution Adaptation (NeurIPS 2024)☆18Nov 14, 2024Updated last year
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆131Apr 10, 2025Updated 11 months ago
- Soot based Jimple interpreter☆14Mar 31, 2021Updated 4 years ago
- An implementation of ResNet with mixup and cutout regularizations and soft filter pruning.☆17Feb 23, 2026Updated 3 weeks ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- ☆11Mar 22, 2022Updated 3 years ago
- Tool for effective and efficient detection of API misuses.☆11May 20, 2022Updated 3 years ago
- CVE List Found by Team Code4Block☆12Dec 19, 2022Updated 3 years ago
- ctfs-2019☆12Nov 29, 2019Updated 6 years ago
- An APK instrumentation library and DroidBox APIMonitor☆57Apr 25, 2013Updated 12 years ago
- 将Apollo3.0中的Lidar感知流程Python感知更新至此仓库,包括单帧识别与动态识别☆17Feb 26, 2019Updated 7 years ago