MeghaJakhotia / ComputerSecurityAttacksLinks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆125Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆894Updated 2 months ago
- Records & Reports for Seed-project☆97Updated 4 years ago
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆46Updated 5 years ago
- Source code for my books☆170Updated 2 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆359Updated 2 years ago
- Public datasets to help you address various cyber security problems.☆461Updated 3 years ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆35Updated 3 years ago
- A curated list of amazingly awesome Cybersecurity datasets☆1,891Updated last year
- An overview of LLMs for cybersecurity.☆1,174Updated last month
- ✍️ All of the challenges I have written for CTFs☆59Updated 3 years ago
- A sorted and updated list of security wargame sites.☆1,138Updated 2 months ago
- Personal Notes About Everything.☆536Updated 4 years ago
- Dataset with labeled benign and malicious files 🗃️☆148Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆131Updated 8 months ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆977Updated last month
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆255Updated 4 years ago
- Online textbook for CS 161: Computer Security at UC Berkeley.☆86Updated 3 months ago
- A Python framework for creating emulation of the Internet.☆264Updated 2 weeks ago
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆690Updated 2 months ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- course materials and references for its450☆35Updated 3 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆792Updated this week
- a list of cybersecurity internships☆563Updated 3 weeks ago
- vulnerability detection in python source code with LSTM networks☆151Updated 5 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆197Updated 2 years ago
- A logic-based enterprise network security analyzer☆136Updated 2 years ago
- Writeups for various CTFs☆672Updated 2 weeks ago
- ☆59Updated 9 years ago
- Finetuning large language models (LLMs) for vulnerability detection☆54Updated 9 months ago
- Have fun with audit log analysis :)☆152Updated last year