Repository for Software Security curriculum
☆15Apr 19, 2020Updated 5 years ago
Alternatives and similar repositories for Software_Security_Experiments
Users that are interested in Software_Security_Experiments are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆35Sep 18, 2024Updated last year
- hack vm☆12Nov 30, 2019Updated 6 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆17Mar 30, 2024Updated last year
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 6 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- Mobile Security - OMTG-Android Walkthrough☆11Oct 31, 2019Updated 6 years ago
- Demo of java-reinforcement-learning library using flappy bird☆16Dec 17, 2017Updated 8 years ago
- [PLDI 19'] An Inductive Synthesis Framework for Verifiable Reinforcement Learning☆14Jan 14, 2020Updated 6 years ago
- ☆15Dec 29, 2023Updated 2 years ago
- JSFlow is a security-enhanced JavaScript interpreter for fine-grained tracking of information flow.☆15May 28, 2021Updated 4 years ago
- The popular Flappy Bird on Android with voice control support! No game engine used!☆15Mar 20, 2020Updated 6 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- 看得一手好文档,走遍天下都不怕。(请尽量用中文。)☆14Oct 29, 2016Updated 9 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- ☆18Jan 17, 2024Updated 2 years ago
- 其他编码文件批量转换为utf-8编码工具。http://git.yoqi.me/lyq/gbk2utf8☆15Sep 16, 2019Updated 6 years ago
- Gray hat python book☆17Sep 25, 2018Updated 7 years ago
- Static Jimple Slicer for Android Apps☆13Dec 2, 2021Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Oct 4, 2019Updated 6 years ago
- ScenarioGenerator - Search-based Software Testing of Baidu Apollo in SVL☆18May 11, 2022Updated 3 years ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆21Oct 5, 2025Updated 5 months ago
- ☆29Oct 28, 2025Updated 4 months ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- llvm tutorial,study in action☆16Jan 15, 2020Updated 6 years ago
- The LLVM Infrastructure Working Group☆18Aug 31, 2022Updated 3 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Code profiler based on Frida☆32Mar 10, 2021Updated 5 years ago
- A verified polyhedral scheduling validator in Coq. Vibing proving in progress: https://github.com/Hughshine/PolCert/tree/extractor. Codex…☆23Mar 9, 2026Updated 2 weeks ago
- Macro pre-processor definitions for ANTLR4 written using ANTLR4 :-)☆12Jul 15, 2018Updated 7 years ago
- This PowerShell Script is used to unprotect EXCEL file without a password☆21Aug 15, 2017Updated 8 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆28Feb 21, 2024Updated 2 years ago
- ☆18Jun 16, 2024Updated last year
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago
- A fuzzer for SMT solvers☆21Aug 22, 2025Updated 7 months ago
- 源代码2017年数学建模国赛B题山东省二等奖☆21Dec 28, 2017Updated 8 years ago