The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025
☆24May 21, 2025Updated 11 months ago
Alternatives and similar repositories for CSEBenchmark
Users that are interested in CSEBenchmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- ☆18Mar 15, 2024Updated 2 years ago
- ☆19Feb 22, 2024Updated 2 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆54Jun 18, 2025Updated 10 months ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆102Feb 10, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- Pytorch implementation of Tree Preference Optimization (TPO) (Accepted by ICLR'25)☆27Apr 24, 2025Updated last year
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 9 years ago
- ☆16Jul 20, 2018Updated 7 years ago
- ☆69Mar 22, 2026Updated last month
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- ☆15May 26, 2021Updated 4 years ago
- SGXCrypter☆15Jan 19, 2017Updated 9 years ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆81Oct 28, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆29Apr 15, 2025Updated last year
- The Oyster series is a set of safety models developed in-house by Alibaba-AAIG, devoted to building a responsible AI ecosystem. | Oyster …☆61Apr 2, 2026Updated 3 weeks ago
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- The CLOVER folder of a fully working hackintosh with ASRock DeskMini H310☆13Dec 16, 2020Updated 5 years ago
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- estimate peak virtual memory use☆18Mar 29, 2025Updated last year
- AI Model Security Reading Notes☆41Mar 14, 2025Updated last year
- ConcoLLMic: the first language- and theory-agonistic concolic execution engine via LLM agents☆137Mar 11, 2026Updated last month
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python tools for targeted pcap analysis.☆13Sep 9, 2015Updated 10 years ago
- Opencore EFI for Dell Precision Tower 3620, Catalina 10.15.6☆15Oct 22, 2020Updated 5 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- A music composer and player with MATLAB☆11Mar 14, 2020Updated 6 years ago
- ☆27Nov 16, 2021Updated 4 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- ☆15Mar 9, 2025Updated last year
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆18Mar 14, 2025Updated last year
- Robust PCA: PCP, Stable PCP, PCP with compressed data, IRCUR☆12Dec 19, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [ICCV 2023] The official PyTorch implementation of the Iterated Integrated Attributions (IIA) method.☆14Mar 13, 2026Updated last month
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆24Jul 1, 2022Updated 3 years ago
- ☆16Feb 23, 2025Updated last year
- Clone and moddifications from http://www.secuobs.com/news/15022006-bss_0_8.shtml☆23Nov 5, 2015Updated 10 years ago
- Official repository of paper "Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval"☆10Dec 20, 2023Updated 2 years ago
- pocs of tested targets☆20Jul 25, 2018Updated 7 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year