The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025
☆24May 21, 2025Updated last year
Alternatives and similar repositories for CSEBenchmark
Users that are interested in CSEBenchmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Mar 15, 2024Updated 2 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆54Jun 18, 2025Updated 11 months ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆102Feb 10, 2026Updated 3 months ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- Pytorch implementation of Tree Preference Optimization (TPO) (Accepted by ICLR'25)☆27Apr 24, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆16Jul 20, 2018Updated 7 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 3 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆19May 6, 2024Updated 2 years ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆84Oct 28, 2025Updated 6 months ago
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆29Apr 15, 2025Updated last year
- The Oyster series is a set of safety models developed in-house by Alibaba-AAIG, devoted to building a responsible AI ecosystem. | Oyster …☆62Apr 29, 2026Updated 3 weeks ago
- 爬取捷安特官方商城某车型库存数据☆13Jul 8, 2022Updated 3 years ago
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Updated this week
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- The CLOVER folder of a fully working hackintosh with ASRock DeskMini H310☆13Dec 16, 2020Updated 5 years ago
- estimate peak virtual memory use☆18Mar 29, 2025Updated last year
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- ConcoLLMic: the first language- and theory-agonistic concolic execution engine via LLM agents☆143Mar 11, 2026Updated 2 months ago
- ☆11Oct 25, 2024Updated last year
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 7 years ago
- Opencore EFI for Dell Precision Tower 3620, Catalina 10.15.6☆15Oct 22, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- A music composer and player with MATLAB☆11Mar 14, 2020Updated 6 years ago
- ☆15Mar 9, 2025Updated last year
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆19Mar 14, 2025Updated last year
- Robust PCA: PCP, Stable PCP, PCP with compressed data, IRCUR☆12Dec 19, 2021Updated 4 years ago
- ☆17Feb 23, 2025Updated last year
- Official repository of paper "Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval"☆11Dec 20, 2023Updated 2 years ago
- pocs of tested targets☆20Jul 25, 2018Updated 7 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆25Jul 1, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆12Aug 20, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆16Dec 11, 2025Updated 5 months ago
- ☆53Feb 8, 2025Updated last year
- ☆99Sep 29, 2025Updated 7 months ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- ☆14Jun 10, 2025Updated 11 months ago