☆18Aug 30, 2024Updated last year
Alternatives and similar repositories for NoDrop
Users that are interested in NoDrop are comparing it to the libraries listed below
Sorting:
- eAudit suite for recording provenance-related system calls on Linux☆18Jan 16, 2026Updated last month
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆30Nov 4, 2023Updated 2 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- ☆86Feb 24, 2025Updated last year
- ☆24Nov 23, 2019Updated 6 years ago
- ☆123May 3, 2023Updated 2 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆96Apr 21, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆12Feb 3, 2026Updated 3 weeks ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated last year
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated 2 months ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- ☆102Aug 23, 2023Updated 2 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- A demontration of disassemblers generated by sleigh2rust☆13Nov 25, 2024Updated last year
- 🔥 🔥 热门推荐 🔥 🔥将黑马点评进行完全地重构升级,围绕优惠券秒杀与热点查询,补齐高并发稳定性、动态令牌、限流、消息可靠性与数据一致性闭环,并添加订阅通知、候补排队等新亮点功能,解决烂大街和亮点不足问题!并打造成真正企业级别实战项目,全面工程化落地。☆48Updated this week
- Red Hat Enterprise Linux 7 Security Technical Implementation Guide in Sphinx☆11Dec 15, 2023Updated 2 years ago
- ☆11May 3, 2019Updated 6 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Build a Web Application Template for the Generalized Rust Axum Library☆12Dec 4, 2025Updated 2 months ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- 📗 Documents of Linux ELF binary signature verification solution.☆11Nov 30, 2020Updated 5 years ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated 11 months ago
- Various dll hollowing techniques☆10Feb 29, 2024Updated 2 years ago
- ☆11Nov 14, 2024Updated last year
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆18Nov 27, 2024Updated last year
- An experimental modular OS written in Rust.☆12Jul 19, 2024Updated last year
- fork from A-Protect☆10Nov 26, 2018Updated 7 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- bert蒸馏实践,包含BiLSTM蒸馏BERT和TinyBert☆13Apr 23, 2022Updated 3 years ago
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆33Jan 10, 2026Updated last month
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated last year
- Official implementation of "FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination"☆10Apr 17, 2024Updated last year
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆51Mar 2, 2024Updated last year