☆86Jan 12, 2017Updated 9 years ago
Alternatives and similar repositories for Computer-Security
Users that are interested in Computer-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 9, 2017Updated 9 years ago
- ☆20Dec 16, 2016Updated 9 years ago
- ☆212Apr 11, 2017Updated 9 years ago
- ISC2017安全大会☆16Nov 3, 2017Updated 8 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆25Mar 15, 2017Updated 9 years ago
- ner using crf++☆10Mar 24, 2015Updated 11 years ago
- 安全盒子,这里主要指的是自己备份的安全行业相关小工具项目集。☆25Nov 24, 2017Updated 8 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- ☆833Jan 21, 2017Updated 9 years ago
- Code for my blog☆11Feb 26, 2017Updated 9 years ago
- ☆11Feb 18, 2025Updated last year
- Pi pattern search utility☆13Sep 18, 2014Updated 11 years ago
- ROP-Gadget finder in Rust☆18Feb 2, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Coq集合模型论☆11Aug 18, 2022Updated 3 years ago
- A pure python3 implementation of CRF tagger☆20Oct 16, 2018Updated 7 years ago
- CAV'22 paper to speed up Neural Network Verification.☆13Dec 19, 2022Updated 3 years ago
- For ACL25 paper "WAFFLE: Multi-Modal Model for Automated Front-End Development" - by Shanchao Liang and Nan Jiang and Shangshu Qian and L…☆11May 28, 2025Updated 11 months ago
- Dynamic parser. You can define parsing rules with a peg format☆15Mar 14, 2020Updated 6 years ago
- Official repository for the paper "GN-Transformer: Fusing AST and Source Code information in Graph Networks".☆17May 25, 2025Updated 11 months ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- A program logic for concurrent randomized programs☆14Nov 9, 2018Updated 7 years ago
- Official repo for Contrastive Diffusion Loss☆14Dec 12, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Advances in Neural Information Processing Systems (NeurIPS 2021)☆23Nov 4, 2022Updated 3 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆15Mar 10, 2024Updated 2 years ago
- ☆11Dec 10, 2017Updated 8 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- Alluxio源码分析、学习☆14Jan 22, 2017Updated 9 years ago
- 基于红外、可见光双光源的车辆目标检测☆16Apr 20, 2022Updated 4 years ago
- CTF challenge and Writeup☆13Apr 11, 2019Updated 7 years ago
- ResNet-50 for TsinghuaDog classification☆10Feb 2, 2021Updated 5 years ago
- Adversarial Robustness for Code☆16Mar 30, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- idaflirt-detector is Python scripts and IDA FLIRT signatures to detect statically linked libraries from stripped ELF file.☆12May 19, 2022Updated 3 years ago
- Information Extraction System can perform NLP tasks like Named Entity Recognition, Sentence Simplification, Relation Extraction etc.☆27Apr 23, 2014Updated 12 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- A curated list of awesome resources for tracking vulnerabilities in software☆19May 4, 2017Updated 8 years ago
- Color palette and swatches for macOS's color picker.☆20Jun 9, 2020Updated 5 years ago
- ☆3,168Apr 5, 2024Updated 2 years ago