MeghaJakhotia / ComputerSecurityAttacksLinks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆125Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆902Updated 2 months ago
- Source code for my books☆171Updated 2 years ago
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆46Updated 5 years ago
- Records & Reports for Seed-project☆97Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆132Updated 9 months ago
- An interactive module to help you learn how to fuzz your first target☆204Updated last year
- ✍️ All of the challenges I have written for CTFs☆59Updated 3 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- Solutions for Network Security Labs offered by SEED Labs☆21Updated 4 years ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆35Updated 3 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆363Updated 2 years ago
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆58Updated 4 months ago
- A sorted and updated list of security wargame sites.☆1,150Updated 2 weeks ago
- Deadline countdowns for academic conferences in Security and Privacy☆797Updated last week
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆706Updated 3 months ago
- course materials and references for its450☆34Updated 3 years ago
- Reverse Engineering CTF Writeups☆24Updated 5 months ago
- Network security related project collection.☆75Updated 6 years ago
- An ML framework for building provenance-based intrusion detection systems (USENIX Sec'25)☆65Updated last month
- A Python framework for creating emulation of the Internet.☆265Updated last week
- knowledge is power☆230Updated 3 weeks ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆371Updated 7 months ago
- vulnerability detection in python source code with LSTM networks☆151Updated 5 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆198Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- Have fun with audit log analysis :)☆152Updated last year
- Chrome Extension for visualizing browsing history☆11Updated 2 years ago
- Course materials for teaching cybersecurity in a Capture the Flag environment☆179Updated 4 years ago
- ☆62Updated last month
- CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and…☆166Updated 2 years ago