☆86Jan 12, 2017Updated 9 years ago
Alternatives and similar repositories for Computer-Security
Users that are interested in Computer-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jan 23, 2017Updated 9 years ago
- ☆91Dec 16, 2016Updated 9 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- ☆18Nov 16, 2016Updated 9 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 用来阅读taro-transformer-wx库,并加以注释☆11Feb 20, 2019Updated 7 years ago
- A web page with resources for teaching with formal methods and tools.☆14Apr 8, 2023Updated 3 years ago
- Code for my blog☆11Feb 26, 2017Updated 9 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- ROP-Gadget finder in Rust☆17Feb 2, 2018Updated 8 years ago
- Coq集合模型论☆11Aug 18, 2022Updated 3 years ago
- R package for Conditional Random Fields☆20Oct 22, 2025Updated 5 months ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 12 years ago
- PRODeep: A Platform for Robustness Verification of Deep Neural Networks☆12Nov 11, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CAV'22 paper to speed up Neural Network Verification.☆13Dec 19, 2022Updated 3 years ago
- For ACL25 paper "WAFFLE: Multi-Modal Model for Automated Front-End Development" - by Shanchao Liang and Nan Jiang and Shangshu Qian and L…☆11May 28, 2025Updated 10 months ago
- Dynamic parser. You can define parsing rules with a peg format☆15Mar 14, 2020Updated 6 years ago
- Official repository for the paper "GN-Transformer: Fusing AST and Source Code information in Graph Networks".☆17May 25, 2025Updated 10 months ago
- Official repo for Contrastive Diffusion Loss☆14Dec 12, 2024Updated last year
- API2Vec: Learning Representations of API Sequences for Malware Detection☆15Mar 10, 2024Updated 2 years ago
- ☆19Jun 11, 2018Updated 7 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 基于红外、可见光双光源的车辆目标检测☆16Apr 20, 2022Updated 3 years ago
- ResNet-50 for TsinghuaDog classification☆10Feb 2, 2021Updated 5 years ago
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- ☆3,172Apr 5, 2024Updated 2 years ago
- Home made trojan (c/c++)☆12Apr 14, 2023Updated 2 years ago
- ☆38Jun 23, 2025Updated 9 months ago
- 2017年东南大学知识图谱暑期训练营☆16Oct 15, 2018Updated 7 years ago
- ☆42Oct 31, 2012Updated 13 years ago
- wechat4j is wechat(weixin) develop framework for java 微信开发框架JAVA版,最简单易用微信开发框架☆32Feb 2, 2016Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated 2 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- A curated list of awesome databases☆19Oct 24, 2014Updated 11 years ago
- Quadcopter control with RL☆16Nov 8, 2021Updated 4 years ago
- 使用 Python 練習 Codility 的題目☆11Jun 14, 2017Updated 8 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- Diary of a reverse-engineer☆39Jan 15, 2018Updated 8 years ago