The notes are the supplement to papers and handouts of CS 259D
☆21May 4, 2018Updated 7 years ago
Alternatives and similar repositories for CS259D_Notes_HW
Users that are interested in CS259D_Notes_HW are comparing it to the libraries listed below
Sorting:
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 7 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- 生成各种形式混淆但有效的IP地址☆22Aug 12, 2018Updated 7 years ago
- A simple JavaScript beautify tool☆28May 3, 2021Updated 4 years ago
- 漏洞测试环境 - 方便写扫描器利用复现☆27Aug 12, 2019Updated 6 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- A benchmark to evaluate taint analysis☆28Jun 20, 2022Updated 3 years ago
- 打CTF实在厌倦了找利用链,就知道一个fastjson的版本,一堆依赖找啊找,头都疼。为了解决这个烦恼,用了卓卓师傅的fastjson黑名单工具和库,自己改造了一下。☆32Jan 3, 2020Updated 6 years ago
- 👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱☆33Jan 3, 2020Updated 6 years ago
- A js infomation dig tool.☆69May 22, 2020Updated 5 years ago
- PhpStudy 2016 & 2018 BackDoor Exploit☆37Sep 26, 2019Updated 6 years ago
- Python Data Audit☆12Jul 24, 2020Updated 5 years ago
- oracle 10g sys权限通过java执行命令获得一个非交互shell的客户端,通常用于正向连接☆39Jan 4, 2017Updated 9 years ago
- WMCTF2020-WriteUp☆35Aug 5, 2020Updated 5 years ago
- Supporting documents for an introduction to Keras workshop at Franceisai event☆13Nov 6, 2016Updated 9 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- Easy typing of Unicode symbols in Emacs, tailored for Haskell sources☆14Sep 5, 2011Updated 14 years ago
- A Julia implementation of the Paillier partially homomorphic encryption system☆12Oct 8, 2020Updated 5 years ago
- Learn about cryptography concepts - Both basics and core.☆10Aug 9, 2024Updated last year
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- 快速找到流行开源项目 browse and find high quality repo quickly and elegantly, with trending, rank, awesome, topics, similar dimensions☆10Nov 14, 2017Updated 8 years ago
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 9 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- woodpecker框架专用bcel库☆12Apr 30, 2021Updated 4 years ago
- 没有怎么整理,大家将就看吧,有问题发一个issue给我☆91Nov 5, 2019Updated 6 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- 数据分析☆12Feb 28, 2017Updated 9 years ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- ☆10Dec 8, 2022Updated 3 years ago
- A tool to integrate post-quantum secure TLS in NGINX using OpenSSL☆11Nov 15, 2021Updated 4 years ago
- FPGA implementation of SKLearn Random Forest☆10Dec 12, 2016Updated 9 years ago