Code for Book "AI for Cybersecurity: A Handbook of Use Case"
☆22Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for AIforCybersecurity
Users that are interested in AIforCybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- CVE-2022-3910☆13Mar 14, 2023Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- 5000 Auto YouTube Comments For Video & Shorts Using Selenium with Python on Localhost☆17Nov 16, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Adaptive Random Forest☆12Feb 12, 2018Updated 8 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- ☆15May 9, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 7 years ago
- Dongliang Mu de Blog☆10Apr 24, 2026Updated last week
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- python exp of pwnable' problems☆18Apr 19, 2026Updated last week
- Practical example from Human-in-the-Loop Machine Learning book☆11Oct 28, 2021Updated 4 years ago
- Samples for using ChatGPT with the Power Platform☆15Apr 26, 2023Updated 3 years ago
- This is the Pytorch implementation of paper--Training deep neural-networks using a noise adaptation layer.☆10Apr 18, 2021Updated 5 years ago
- ☆39Dec 24, 2023Updated 2 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- MARNNs Can Learn Generalized Dyck Languages☆12Nov 11, 2019Updated 6 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- Code for ICML 2021 paper: How could Neural Networks understand Programs?☆123Nov 7, 2024Updated last year
- ☆15Sep 14, 2022Updated 3 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 8 months ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [ICLR 2026] The official code for "Doxing via the Lens: Revealing Location-related Privacy Leakage on Multi-modal Large Reasoning Models"☆26Feb 7, 2026Updated 2 months ago
- Linux kernel SGX driver for Graphene☆12Nov 3, 2020Updated 5 years ago
- A simple PyTorch implementations of `Badnets: Identifying vulnerabilities in the machine learning model supply chain` on MNIST and CIFAR1…☆11May 19, 2021Updated 4 years ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- ☆20Jun 7, 2025Updated 10 months ago
- State-Regularized Recurrent Neural Networks☆11Sep 20, 2019Updated 6 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago