该资源主要为基本安全软件,主要方便大家
☆17Mar 18, 2020Updated 6 years ago
Alternatives and similar repositories for Security-Software-Based
Users that are interested in Security-Software-Based are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 该资源为杨秀璋作者《Python网络数据爬取及分析从入门到精通(分析篇)》书籍所有源代码,包括可视化分析、聚类分析、回归分析、分类分析、词云和LDA分析等内容。所有代码已修改为Python3实现,希望对您有所帮助,一起加油。☆11Aug 12, 2021Updated 4 years ago
- 该资源主要是作者翻译各大安全厂商的APT报告,希望对您有所帮助。☆20Nov 23, 2020Updated 5 years ago
- 该资源主要总结AI文本挖掘、知识发现、数据挖掘、图书情报和知识图谱相关论文。重点以国内和国外优秀论文为主,希望能帮助到大家,也欢迎大家补充。☆21Oct 9, 2021Updated 4 years ago
- 该资源为杨秀璋作者《Python网络数据爬取及分析从入门到精通(爬取篇)》书籍所有源代码,包括Python基础、网络爬虫基础、Urllib、BeautifulSoup、Selenium、在线百科抓取、豆瓣抓取、微博抓取等内容。所有代码已修改为Python3实现,希望对您有所…☆19Aug 10, 2021Updated 4 years ago
- 该资源为《软件安全》课程实验及工具,包括PE文件解析、数字签名解析、恶意软件分析、CVE漏洞复现等。希望对您有所帮助~☆79May 21, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 为了更好地管理博客文章,分享更好的知识,该系列资源为作者CSDN博客的备份文件。本资源为作者Python数据挖掘课程系列,主要是作者《数据挖掘》、《大数据分析及技术》等课程分享的内容,涉及Python基础知识、网络爬虫、聚类 、分类、回归、情感分析、可视化分析等知识,基础性文…☆23Mar 14, 2020Updated 6 years ago
- 该资源主要讲解逆向分析基础知识,包括OllyDbg和IDA Pro工具的利用,希望对您有所帮助~☆31May 13, 2020Updated 5 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 5 years ago
- 该资源是作者收集各种类型CTF比赛的常用工具,包括Web、RE、Misc、Crypto、PWN、IOT等方向,非常适合安全初学者。希望对您有所帮助,也欢迎大家补充~☆13Aug 25, 2024Updated last year
- 该资源为作者CTF学习Web类型题目解题思路,希望对您有所帮助~☆12Jun 13, 2020Updated 5 years ago
- 该资源为中国蚁剑,包括Windows和Kali两个版本及安全教程。希望对您有所帮助~☆12Jun 5, 2020Updated 5 years ago
- 该资源为作者Eastmount在CSDN《Python图像处理》专栏系列分享的全文知识,只要为PDF文件,只希望帮助更多人学习Python图像处理。不负遇见,不负韶华,加油~☆48Aug 10, 2021Updated 4 years ago
- 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但 希望坚持下去,加油!☆30Feb 17, 2020Updated 6 years ago
- 该资源为网络安全和Web渗透各种类型题目的离线靶场,主要采用PHP语言实现,包括XSS攻击、文件上传漏洞、SQL注入等,基础性资源,希望对安全初学者有所帮助。加油~☆48Aug 9, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Adaptive Decomposition and Extraction Network of Individual Fingerprint Features for Specific Emitter Identification☆13Aug 25, 2023Updated 2 years ago
- ☆11Jan 26, 2016Updated 10 years ago
- 该资源为MFC制作的图像处理工具,包括图像灰度、采样、量化、灰度直方图、灰度线性变化、灰度非线性变化、阈值化、均衡化处理等。☆20Mar 24, 2020Updated 6 years ago
- BookStack,GitBook的go语言实现,markdown文档在线阅读解决方案。☆23Feb 17, 2018Updated 8 years ago
- Quarks PwDump is a native Win32 tool to extract credentials from Windows operating systems.☆12Jun 25, 2015Updated 10 years ago
- Generate SDKs from Unreal Engine games (UE1 - 4 supported).☆11Nov 4, 2017Updated 8 years ago
- 该资源为恶意代码检测与识别的相关链接汇总,希望对您有所帮助!☆21Jun 27, 2020Updated 5 years ago
- ☆21Aug 17, 2015Updated 10 years ago
- a sandbox project by sudami☆17Jul 31, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆17Nov 24, 2020Updated 5 years ago
- 本系列代码主要是作者Python人工智能之Keras的系列博客,涉及回归神经网络、CNN、RNN、LSTM等内容。基础性代码,希望对您有所帮助。☆69Mar 22, 2025Updated last year
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆14Dec 23, 2023Updated 2 years ago
- Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)☆14Mar 11, 2020Updated 6 years ago
- [TNNLS 2024] Improving Semi-supervised Anomaly Detection with Pseudo-anomaly Generation☆19Jul 2, 2024Updated last year
- ☆14Jul 14, 2019Updated 6 years ago
- ☆14May 30, 2022Updated 3 years ago
- About the code release for "Federated PCA on Grassmann Manifold for IoT Anomaly Detection" ToN2024☆21May 28, 2025Updated 11 months ago
- (武汉大学) 华科PKE操作系统内核实验答案☆12Jul 13, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Changes handle's access rights using DKOM with a vulnerable driver☆28Sep 5, 2017Updated 8 years ago
- Proof of Concept for CVE-2020-0601☆66Apr 11, 2026Updated 3 weeks ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆30Sep 30, 2021Updated 4 years ago
- 这是作者恶意代码分析、网络安全、系统安全等系列教程,主要是通过机器学习、人工智能和深度学习来分析恶意代码的在线笔记。希望对您有所帮助,学无止境,一起加油。☆105Sep 7, 2020Updated 5 years ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Mar 24, 2021Updated 5 years ago
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆28Dec 5, 2023Updated 2 years ago
- 微信公众号毫秒级排版,让你的排版充满审美愉悦感。复制代码到“markdown here基本渲染css”即可。☆35Jan 10, 2024Updated 2 years ago