MeghaJakhotia / ComputerSecurityAttacksLinks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆123Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆878Updated last month
- Records & Reports for Seed-project☆95Updated 4 years ago
- Source code for my books☆164Updated 2 years ago
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆45Updated 5 years ago
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆57Updated 3 weeks ago
- ✍️ All of the challenges I have written for CTFs☆58Updated 3 years ago
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆652Updated 10 months ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- Machine Learning for Cybersecurity Cookbook, published by Packt☆349Updated 2 years ago
- A sorted and updated list of security wargame sites.☆1,089Updated this week
- A curated list of amazingly awesome Cybersecurity datasets☆1,814Updated last year
- Personal Notes About Everything.☆527Updated 4 years ago
- Solutions for Network Security Labs offered by SEED Labs☆20Updated 3 years ago
- knowledge is power☆229Updated 2 months ago
- Public datasets to help you address various cyber security problems.☆453Updated 3 years ago
- A Python framework for creating emulation of the Internet.☆258Updated 2 weeks ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆193Updated 2 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆766Updated this week
- Writeups for various CTFs☆662Updated 4 months ago
- Tutorials for getting started with Pwntools☆1,516Updated last year
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆28Updated 3 years ago
- Course materials for teaching cybersecurity in a Capture the Flag environment☆175Updated 4 years ago
- An interactive module to help you learn how to fuzz your first target☆186Updated last year
- Have fun with audit log analysis :)☆152Updated last year
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- vulnerability detection in python source code with LSTM networks☆150Updated 5 years ago
- Infrastructure powering the pwn.college dojo☆393Updated this week
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆173Updated 2 years ago
- 💻 CTF Heaven☆277Updated 6 months ago
- Dataset with labeled benign and malicious files 🗃️☆138Updated 2 years ago