Code for Book "AI for Cybersecurity: A Handbook of Use Case"
☆22Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for AIforCybersecurity
Users that are interested in AIforCybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- Chat4GPT Experiments for Security☆11Mar 27, 2023Updated 3 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- 5000 Auto YouTube Comments For Video & Shorts Using Selenium with Python on Localhost☆17Nov 16, 2025Updated 6 months ago
- SafeType™ anonymizes sensitive data typed into ChatGPT to avoid misuse and accidental disclosures☆17Feb 14, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Feb 18, 2024Updated 2 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Adaptive Random Forest☆13Feb 12, 2018Updated 8 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Dongliang Mu de Blog☆10Apr 24, 2026Updated 3 weeks ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- python exp of pwnable' problems☆18Apr 19, 2026Updated last month
- Samples for using ChatGPT with the Power Platform☆15Apr 26, 2023Updated 3 years ago
- ☆39Dec 24, 2023Updated 2 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Lexical analyzer.☆10Jan 30, 2021Updated 5 years ago
- Code for ICML 2021 paper: How could Neural Networks understand Programs?☆123Nov 7, 2024Updated last year
- A list of data-only attacks☆21Aug 22, 2025Updated 9 months ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- Linux kernel SGX driver for Graphene☆12Nov 3, 2020Updated 5 years ago
- The toolchain of Chosen-instruction attack☆22May 3, 2022Updated 4 years ago
- Youtube Auto Likes And Subscribe & Community Post Like With Python☆17Dec 1, 2024Updated last year
- ☆20Jun 7, 2025Updated 11 months ago
- State-Regularized Recurrent Neural Networks☆11Sep 20, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- Extracting minimal DFA's from well-trained RNN's☆11Nov 26, 2018Updated 7 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆28Nov 4, 2022Updated 3 years ago
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Jul 21, 2024Updated last year
- ☆18Aug 5, 2020Updated 5 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 7 years ago
- The purpose of this document is to outline the security risks and vulnerabilities that may arise when implementing ai in web applications…☆33Jan 31, 2026Updated 3 months ago