MeghaJakhotia / ComputerSecurityAttacksLinks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆125Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
Sorting:
- Records & Reports for Seed-project☆97Updated 5 years ago
- SEED Labs developed in the last 20 years.☆910Updated 3 months ago
- Source code for my books☆172Updated 2 years ago
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆46Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆133Updated 9 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆797Updated last week
- Solutions for Network Security Labs offered by SEED Labs☆21Updated 4 years ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆35Updated 3 years ago
- Personal Notes About Everything.☆545Updated 4 years ago
- PentestAgent is a novel LLM-driven penetration testing framework to automate intelligence gathering, vulnerability analysis, and exploita…☆111Updated last month
- A Python framework for creating emulation of the Internet.☆265Updated last week
- An overview of LLMs for cybersecurity.☆1,201Updated 2 months ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆213Updated 3 months ago
- ☆63Updated 2 months ago
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆718Updated last week
- A curated list of malware-related papers.☆34Updated last year
- Public datasets to help you address various cyber security problems.☆463Updated 3 years ago
- Have fun with audit log analysis :)☆153Updated last year
- Finetuning large language models (LLMs) for vulnerability detection☆56Updated 10 months ago
- We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.☆26Updated 3 years ago
- Infrastructure powering the pwn.college dojo☆424Updated this week
- ☆35Updated 2 months ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Updated 2 years ago
- ✍️ All of the challenges I have written for CTFs☆59Updated 3 years ago
- A sorted and updated list of security wargame sites.☆1,154Updated 3 weeks ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆377Updated 7 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 9 months ago
- An interactive module to help you learn how to fuzz your first target☆204Updated last year
- Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.☆20Updated 2 years ago