airlitti / COMP90018-2022-Tutorial
☆8Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for COMP90018-2022-Tutorial
- Creates a bridge between python 2.7 (needed for NaoQi) and python 3☆14Updated 4 years ago
- Astrology calculations with dual-zodiac (tropical and Hindu-Lahiri sidereal) options☆12Updated 3 years ago
- Webshell with the newest, easiest, and shortest code and technique.☆9Updated 3 years ago
- CyberMetric dataset☆53Updated last month
- This repository includes a set of tools that can help parsing data from cnki, extending information through reptile crawling from baidu b…☆21Updated last year
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆16Updated 5 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆17Updated 6 years ago
- Notes for HungYi Lee - The Next Step for Machine Learning☆11Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆18Updated 2 years ago
- 《自然语言处理综论》第三版翻译。☆109Updated last year
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- Chinavis2018挑战1一等奖作品-基于内网的威胁情报可视分析☆36Updated last year
- 地学知识图谱知识服务平台:知识图谱管理、知识图谱可视化、知识问答、知识图谱推荐、领域知识图谱☆64Updated last year
- Vulnerability knowledge graph construction☆19Updated last year
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆57Updated 4 years ago
- Attempt for a cross platform AES-GCM encryption☆40Updated 4 years ago
- 实验室工作实录,一个二导☆33Updated last year
- Exploit script for CVE-2020-7961☆17Updated 3 years ago
- ☆14Updated last year
- Daily updated LLM papers. 每日更新 LLM 相关的论文,欢迎订阅 👏 喜欢的话动动你的小手 🌟 一个☆981Updated 3 months ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆100Updated 2 months ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆25Updated 8 years ago
- A reverse engineering framework written in Python that I developed but no longer maintain.☆16Updated 12 years ago
- ☆14Updated 2 years ago
- Curated tutorials and resources for Large Language Models, Text2SQL, Text2DSL、Text2API、Text2Vis and more.☆1,898Updated 3 weeks ago
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- This repository contains data pre-processing and visualization scripts used in GENEA Challenge 2022 and 2023. Check the repository's READ…☆24Updated 4 months ago
- Various shell code I have written☆17Updated 4 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Updated 3 years ago