☆28Mar 10, 2024Updated last year
Alternatives and similar repositories for LLMIF
Users that are interested in LLMIF are comparing it to the libraries listed below
Sorting:
- SAGE disambiguates protocol description in an IETF RFC document, then converts the disambiguated protocol description into executable pro…☆18Aug 9, 2021Updated 4 years ago
- Peach Fuzzer 3.x☆23Apr 7, 2016Updated 9 years ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆378Jun 30, 2025Updated 8 months ago
- ☆22Mar 3, 2022Updated 4 years ago
- ☆27Jun 7, 2022Updated 3 years ago
- ☆30Dec 4, 2021Updated 4 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆73Jul 25, 2024Updated last year
- ☆37May 2, 2023Updated 2 years ago
- Linux Firewall using Kernel Module☆10Nov 9, 2017Updated 8 years ago
- BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect☆11May 21, 2024Updated last year
- Example project for the BRS-100-GW1NR9 FPGA development board.☆14Feb 14, 2026Updated 2 weeks ago
- ☆10Feb 6, 2018Updated 8 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆15Jan 17, 2025Updated last year
- 汇集中文网站所有在线ai,包括AI搜索,AI文档问答,AIGC 等等☆12Aug 30, 2024Updated last year
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- OCR识别内容后直接请求GPT获取结果的便捷工具。☆11May 5, 2023Updated 2 years ago
- ☆13Mar 19, 2022Updated 3 years ago
- Code for "The Whole Truth and Nothing But the Truth: Faithful and Controllable Dialogue Response Generation with Dataflow Transduction an…☆11Apr 30, 2024Updated last year
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 9 months ago
- ☆11Mar 5, 2023Updated 2 years ago
- DiAne is a smart fuzzer for IoT devices☆42Apr 3, 2024Updated last year
- ☆97Sep 29, 2025Updated 5 months ago
- BACnet/SC support for Wireshark☆13Oct 5, 2022Updated 3 years ago
- Hardware transactions library for Amaranth☆22Feb 6, 2026Updated 3 weeks ago
- ☆13Oct 1, 2020Updated 5 years ago
- ☆11Oct 10, 2023Updated 2 years ago
- ☆12Jan 30, 2024Updated 2 years ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆20Nov 10, 2025Updated 3 months ago
- 邮件群发☆15Mar 23, 2024Updated last year
- ☆13Jan 22, 2026Updated last month
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- QEMU-AVR32 OPS-SAT Emulator☆16Sep 28, 2023Updated 2 years ago
- ☆36Nov 13, 2025Updated 3 months ago
- 黄峥(拼多多)的创业思考☆19Dec 18, 2019Updated 6 years ago
- Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation☆18Jun 9, 2025Updated 8 months ago
- (python) 使用window微信客服端向指定用户/群发送信息☆13Jun 24, 2020Updated 5 years ago
- Code and resources for model learning of network protocol implementations☆18Oct 26, 2023Updated 2 years ago