MeghaJakhotia / ComputerSecurityAttacks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆115Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
Sorting:
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆47Updated 5 years ago
- SEED Labs developed in the last 20 years.☆832Updated last week
- Records & Reports for Seed-project☆95Updated 4 years ago
- Source code for my books☆163Updated 2 years ago
- course materials and references for its450☆32Updated 3 years ago
- A Python framework for creating emulation of the Internet.☆244Updated 2 weeks ago
- Personal Notes About Everything.☆502Updated 4 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- This project contains files for cyber security☆34Updated 6 years ago
- This repository contains my implementation of SEED Labs☆15Updated 4 years ago
- ✍️ All of the challenges I have written for CTFs☆53Updated 3 years ago
- An interactive module to help you learn how to fuzz your first target☆171Updated 9 months ago
- Online textbook for CS 161: Computer Security at UC Berkeley.☆75Updated 4 months ago
- knowledge is power☆217Updated last week
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆335Updated 7 months ago
- ☆23Updated 6 months ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆241Updated 3 years ago
- a list of cybersecurity internships☆538Updated last year
- CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and…☆156Updated last year
- Resources for learning about cybersecurity and CTFs☆207Updated 2 years ago
- Assignments and wireshark labs for Computer Networking: A Top Down Approach 7th Edition☆76Updated 5 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆152Updated 2 years ago
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆53Updated 5 months ago
- ☆60Updated 2 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆21Updated 2 years ago
- My write-ups from various CTFs☆118Updated last year
- Writeups for various CTFs☆641Updated 10 months ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆335Updated 2 years ago
- ☆20Updated last month
- Infrastructure powering the pwn.college dojo☆358Updated last week