Android Al-Khaser
☆14Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for AAl-Khaser
Users that are interested in AAl-Khaser are comparing it to the libraries listed below
Sorting:
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆29Nov 18, 2023Updated 2 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- ☆13May 13, 2025Updated 9 months ago
- ☆17Nov 24, 2025Updated 3 months ago
- Computational Memory Neural Network Compiler☆11Aug 11, 2021Updated 4 years ago
- Gen2-UHF-RFID-Reader based on Latest Ubuntu, GNU Radio, UHD and Python☆13Jul 14, 2023Updated 2 years ago
- From-Classification-to-Clinical☆12Apr 26, 2024Updated last year
- Implementation for GPIoT: Tailoring Small Language Models for IoT Program Synthesis and Development☆20Jul 24, 2025Updated 7 months ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Nov 22, 2023Updated 2 years ago
- Official code for "From Seeing to Doing: Bridging Reasoning and Decision for Robotic Manipulation" (ICLR2026)☆31Updated this week
- Automatic hacking tool for URL regexes.☆11Feb 12, 2021Updated 5 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆18Mar 5, 2025Updated last year
- ☆17Jul 25, 2024Updated last year
- A example hook syscall of ioctl☆25Jan 18, 2025Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19May 23, 2022Updated 3 years ago
- ☆16Updated this week
- Boundary analysis based Reachability analysis Toolbox for dynamic systems in Python☆19Jan 16, 2026Updated last month
- Resolve symbols from release rust binaries on Windows☆21Jan 17, 2024Updated 2 years ago
- Python CLI and wrapper for the Mobile Security Framework (MobSF) REST-API☆17Feb 9, 2021Updated 5 years ago
- ☆20Aug 4, 2022Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Jul 7, 2021Updated 4 years ago
- Official code for Continuous-Time Functional Diffusion Processes (NeurIPS 2023).☆21May 5, 2024Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- The official PyTorch Implementation of MetaSense (MetaSense: Few-Shot Adaptation to Untrained Conditions in Deep Mobile Sensing, ACM SenS…☆17Oct 12, 2022Updated 3 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- USRP2 RFID Reader☆25Aug 8, 2021Updated 4 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Mar 17, 2021Updated 4 years ago
- Deliberately vulnerable scripts for Web Security training☆21Jan 2, 2026Updated 2 months ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 8 months ago
- Implementation for AutoIOT: LLM-Driven Automated Natural Language Programming for AIoT Applications☆36Apr 21, 2025Updated 10 months ago
- Official Implementation of FLARE (AAAI'25 Oral)☆29Nov 27, 2025Updated 3 months ago
- ☆24Apr 17, 2020Updated 5 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆21Mar 7, 2025Updated 11 months ago
- ☆27Jan 17, 2024Updated 2 years ago
- ☆26Feb 9, 2023Updated 3 years ago
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆34Feb 17, 2026Updated 2 weeks ago
- ☆34Aug 28, 2024Updated last year
- RF-Net: A Unified Meta-Learning Framework for RF-enabledOne-Shot Human Activity Recognition☆26Sep 2, 2021Updated 4 years ago