☆18Jun 30, 2022Updated 3 years ago
Alternatives and similar repositories for Illuminati
Users that are interested in Illuminati are comparing it to the libraries listed below
Sorting:
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- ☆24Dec 4, 2020Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against em…☆33Jan 3, 2022Updated 4 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- https://github.com/aligungr/UERANSIM☆10Apr 23, 2021Updated 4 years ago
- (AAAI 2026) OSVBench, a new benchmark for evaluating Large Language Models (LLMs) in generating complete specification code pertaining to…☆13May 13, 2025Updated 9 months ago
- A friendly UI for arXiv hosting papers on fairness and ethics in Machine Learning & Data Science☆12Jul 4, 2019Updated 6 years ago
- An easy-to-run implementation for finetuning large language models (LLMs) such as llama and gemma, supporting full parameter finetuning, …☆12May 6, 2024Updated last year
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- Adversarial learning by utilizing model interpretation☆10Oct 19, 2018Updated 7 years ago
- 8 labs of course Introduction to Computer System☆10Jun 17, 2014Updated 11 years ago
- ☆13Mar 19, 2022Updated 3 years ago
- Can Large Language Models Identify Authorship? (EMNLP 2024 Findings)☆12Feb 4, 2025Updated last year
- This is the tool released in ICSE 2024 paper "Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type Er…☆17Jun 5, 2023Updated 2 years ago
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- Code for ICML 2022 paper: Achieving Fairness at No Utility Cost via Data Reweighing with Influence☆11Aug 3, 2022Updated 3 years ago
- ☆11May 14, 2024Updated last year
- Deep Dual Support Vector Data Description for Anomaly Detection on Attributed Networks☆12Oct 4, 2021Updated 4 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- Neural Turing Machine☆13Jun 18, 2018Updated 7 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- Linux tools to configure ATA security on NVMe drives☆15Mar 5, 2025Updated 11 months ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆12Aug 9, 2023Updated 2 years ago
- An OpenAI Gym implementation of the famous Connect 4 environment☆11Jan 11, 2021Updated 5 years ago
- ☆14Aug 18, 2025Updated 6 months ago