Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆126Feb 14, 2020Updated 6 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Records & Reports for Seed-project☆97Jan 12, 2021Updated 5 years ago
- SEED Labs developed in the last 20 years.☆932Nov 4, 2025Updated 4 months ago
- Translating WebAssembly into the most simple LLVM IR.☆15Jan 6, 2026Updated 2 months ago
- Source code for my books☆173Apr 17, 2023Updated 2 years ago
- ☆12Jun 4, 2025Updated 9 months ago
- Github Action to run Dockle and report in workflows, pipeline and PR's☆14Feb 26, 2026Updated 3 weeks ago
- ☆13Sep 29, 2024Updated last year
- 一些实验☆15Jul 11, 2018Updated 7 years ago
- ☆26Jul 18, 2024Updated last year
- ☆15Jul 14, 2024Updated last year
- 《人工智能法规、伦理与社会影响》书稿☆13Aug 28, 2021Updated 4 years ago
- Open-source, enterprise-grade threat modeling platform☆32Updated this week
- Chrome Extension for visualizing browsing history☆11Sep 6, 2023Updated 2 years ago
- The repository of Pentest-R1: Towards Autonomous Penetration Testing Reasoning Optimized via Two-Stage Reinforcement Learning.☆30Sep 8, 2025Updated 6 months ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- ☆10Dec 13, 2021Updated 4 years ago
- Parsec Go client☆12Oct 25, 2022Updated 3 years ago
- Learning playground for Argus-SAF☆10Dec 27, 2018Updated 7 years ago
- SRAM☆22Sep 6, 2020Updated 5 years ago
- ☆38Oct 4, 2024Updated last year
- The goal of this repo is to become a benchmark for pentesting☆22Oct 25, 2024Updated last year
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- ☆12Jan 28, 2023Updated 3 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆12Jul 18, 2021Updated 4 years ago
- ☆11Mar 22, 2024Updated 2 years ago
- Hyperterm theme based on gruvbox☆17Feb 10, 2017Updated 9 years ago
- GDBP-PEDA Cheat Sheet☆16Feb 14, 2017Updated 9 years ago
- A personal repository of SUSTech course CS304 software engineering☆11Jun 22, 2018Updated 7 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Integer overflow in FreeType software, which also affects Chrome☆29Aug 27, 2025Updated 6 months ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- Implementation for the DIMVA'22 paper "Branch Different - Spectre Attacks on Apple Silicon"☆39Jul 29, 2022Updated 3 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 4 months ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆59Apr 3, 2024Updated last year
- [OBSOLETE] converts .wast files -> .wasm☆21Feb 17, 2018Updated 8 years ago