Code for Book "AI for Cybersecurity: A Handbook of Use Case"
☆22Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for AIforCybersecurity
Users that are interested in AIforCybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- Chat4GPT Experiments for Security☆11Mar 27, 2023Updated 3 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- CVE-2022-3910☆13Mar 14, 2023Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 5000 Auto YouTube Comments For Video & Shorts Using Selenium with Python on Localhost☆17Nov 16, 2025Updated 4 months ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Adaptive Random Forest☆12Feb 12, 2018Updated 8 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- ☆15May 9, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- Practical example from Human-in-the-Loop Machine Learning book☆11Oct 28, 2021Updated 4 years ago
- ☆39Dec 24, 2023Updated 2 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- MARNNs Can Learn Generalized Dyck Languages☆12Nov 11, 2019Updated 6 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- Lexical analyzer.☆10Jan 30, 2021Updated 5 years ago
- Code for ICML 2021 paper: How could Neural Networks understand Programs?☆123Nov 7, 2024Updated last year
- ☆15Sep 14, 2022Updated 3 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- Experimental wandb CLI and Python API - See Experimental section below.☆16Sep 24, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆20Jun 7, 2025Updated 10 months ago
- State-Regularized Recurrent Neural Networks☆11Sep 20, 2019Updated 6 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Jul 21, 2024Updated last year
- Modify ELF executables☆16Mar 5, 2019Updated 7 years ago
- ☆18Aug 5, 2020Updated 5 years ago