jackfromeast / DES_algorithm
使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns
☆10Updated 5 years ago
Alternatives and similar repositories for DES_algorithm
Users that are interested in DES_algorithm are comparing it to the libraries listed below
Sorting:
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆53Updated 3 years ago
- ☆26Updated last year
- 基于图神经网络的切片级漏洞检测及解释方法☆46Updated 6 months ago
- ☆38Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆21Updated 3 years ago
- Data Mining for Cybersecurity☆77Updated 2 years ago
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆13Updated 3 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆105Updated 4 years ago
- 一个搜索网络安全领域顶会论文的小工具☆86Updated 6 months ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆113Updated 4 years ago
- ☆13Updated 3 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆158Updated last year
- ☆44Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Updated last year
- A collection of security papers on top-tier publications☆43Updated last week
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆210Updated last year
- ☆12Updated 4 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 6 months ago
- 该资源为恶意代码检测相关的论文或文章总结,包括作者撰写的恶意代码与机器学习、深度学习相关博客,希望对您有所帮助~☆14Updated 4 years ago
- 📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)☆20Updated 3 years ago
- A curated list of malware-related papers.☆28Updated last year
- 静态分析笔记 Static-Analysis-Notes 程序分析笔记 资源分享☆182Updated 2 years ago
- A video-based distracted driver detection system.☆21Updated 2 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆39Updated 2 years ago
- Awesome Large Language Models for Vulnerability Detection☆100Updated this week
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆12Updated 7 months ago
- 基于深度学习的恶意软件检测研究;MalConv;☆100Updated 2 years ago
- https://github.com/SySeVR/SySeVR 项目的所需依赖和部分修改后的代码☆25Updated 4 years ago
- ☆11Updated 2 years ago