Code for Book "AI for Cybersecurity: A Handbook of Use Case"
☆22Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for AIforCybersecurity
Users that are interested in AIforCybersecurity are comparing it to the libraries listed below
Sorting:
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Chat4GPT Experiments for Security☆11Mar 27, 2023Updated 2 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Papers related with kernel papers☆13Mar 18, 2023Updated 2 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Text Generation Using RNNs☆12Dec 15, 2018Updated 7 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- ☆18Aug 5, 2020Updated 5 years ago
- ☆20Jun 7, 2025Updated 8 months ago
- ☆43Jun 14, 2022Updated 3 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 6 months ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- ☆39Dec 24, 2023Updated 2 years ago
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Jul 21, 2024Updated last year
- Source code of SEmu-Fuzz☆22Nov 30, 2024Updated last year
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Feb 29, 2024Updated 2 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- ☆27Mar 16, 2023Updated 2 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆26May 10, 2021Updated 4 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago