☆86Jan 12, 2017Updated 9 years ago
Alternatives and similar repositories for Computer-Security
Users that are interested in Computer-Security are comparing it to the libraries listed below
Sorting:
- ☆20Dec 16, 2016Updated 9 years ago
- Training project about Deep Learing☆12Jun 22, 2017Updated 8 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- x86汇编 从实模式到保护模式,mac版本☆18Apr 12, 2019Updated 6 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- Code for my blog☆11Feb 26, 2017Updated 9 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- ROP-Gadget finder in Rust☆17Feb 2, 2018Updated 8 years ago
- ☆14Dec 24, 2015Updated 10 years ago
- Coq集合模型论☆11Aug 18, 2022Updated 3 years ago
- Different physical simulations using GLSL enabled shaders with OpenGL, WebGL and Three.js. Currently holds GPU versions of particles, flo …☆16Dec 16, 2013Updated 12 years ago
- 3D cloth openframeworks + glm☆10Feb 3, 2015Updated 11 years ago
- Notes for the Coursera course Functional Programming Principles in Scala by Martin Odersky☆18Sep 16, 2019Updated 6 years ago
- A CALayer subclass that supports gif animation☆25Nov 11, 2012Updated 13 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 12 years ago
- PRODeep: A Platform for Robustness Verification of Deep Neural Networks☆12Nov 11, 2020Updated 5 years ago
- CAV'22 paper to speed up Neural Network Verification.☆13Dec 19, 2022Updated 3 years ago
- For ACL25 paper "WAFFLE: Multi-Modal Model for Automated Front-End Development" - by Shanchao Liang and Nan Jiang and Shangshu Qian and L…☆11May 28, 2025Updated 9 months ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- 树莓派raspberrypi/奥松dht11 dht22传感器/攀藤pms5003s(G5s)颗粒传感器/highchart.js/flask☆11Jul 17, 2023Updated 2 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- A paged collection view layout☆14Apr 8, 2016Updated 9 years ago
- A program logic for concurrent randomized programs☆14Nov 9, 2018Updated 7 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated 2 years ago
- Using OpenCV to add a depth-of-field bokeh effect to 3D scenes rendered by OpenGL. Uses some optimizations and tricks such as dividing th…☆10Nov 9, 2020Updated 5 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- a language-aware tool for comparing programs☆27Jul 21, 2011Updated 14 years ago
- 基于红外、可见光双光源的车辆目标检测☆16Apr 20, 2022Updated 3 years ago
- ResNet-50 for TsinghuaDog classification☆10Feb 2, 2021Updated 5 years ago
- idaflirt-detector is Python scripts and IDA FLIRT signatures to detect statically linked libraries from stripped ELF file.☆12May 19, 2022Updated 3 years ago
- Adversarial Robustness for Code☆16Mar 30, 2021Updated 4 years ago
- Efficient approximation algorithms for Shapley Values in Horizontal Enterprise Federated Learning☆13May 5, 2020Updated 5 years ago
- ☆22Sep 1, 2023Updated 2 years ago
- Development of an autonomous arduino RC car controlled by an android app through bluetooth☆13Jul 22, 2018Updated 7 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- Programming exercises for kids (no prior programming experience required)☆17Jul 13, 2024Updated last year
- ofxOculusRift☆54Jan 30, 2014Updated 12 years ago
- Shows why one CocoaPod depends on another☆16Sep 17, 2025Updated 6 months ago