MeghaJakhotia / ComputerSecurityAttacksLinks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆125Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆890Updated last month
- Records & Reports for Seed-project☆97Updated 4 years ago
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆46Updated 5 years ago
- Source code for my books☆169Updated 2 years ago
- An interactive module to help you learn how to fuzz your first target☆198Updated last year
- knowledge is power☆228Updated 4 months ago
- A sorted and updated list of security wargame sites.☆1,126Updated last month
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- Infrastructure powering the pwn.college dojo☆417Updated this week
- A Python framework for creating emulation of the Internet.☆263Updated this week
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆364Updated 5 months ago
- Personal Notes About Everything.☆535Updated 4 years ago
- ☆28Updated last year
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆58Updated 2 months ago
- Reverse Engineering CTF Writeups☆24Updated 4 months ago
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆683Updated 2 months ago
- Chrome Extension for visualizing browsing history☆11Updated 2 years ago
- vulnerability detection in python source code with LSTM networks☆152Updated 5 years ago
- ✍️ All of the challenges I have written for CTFs☆59Updated 3 years ago
- A curated list of awesome directed fuzzing research papers☆568Updated 2 weeks ago
- Solutions for Network Security Labs offered by SEED Labs☆21Updated 4 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆349Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,531Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆129Updated 8 months ago
- An overview of LLMs for cybersecurity.☆1,147Updated 2 weeks ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆846Updated 2 months ago
- Course materials for teaching cybersecurity in a Capture the Flag environment☆177Updated 4 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Updated 2 years ago
- ☆24Updated last year
- A curated list of sanitizers to detect bugs☆23Updated 2 months ago