使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns
☆10Apr 15, 2020Updated 5 years ago
Alternatives and similar repositories for DES_algorithm
Users that are interested in DES_algorithm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A video-based distracted driver detection system.☆26Oct 26, 2022Updated 3 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆54Nov 29, 2021Updated 4 years ago
- DES 加密算法的 Python3 实现☆15May 28, 2018Updated 7 years ago
- ☆12Oct 14, 2025Updated 5 months ago
- 四川大学抢课系统 (已整合进入Draven-System)☆14Mar 4, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆17Jan 1, 2024Updated 2 years ago
- angr's exploration technique to perform taint analysis☆63Mar 26, 2020Updated 6 years ago
- ☆22Sep 28, 2022Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Aug 9, 2024Updated last year
- ☆31Jan 4, 2023Updated 3 years ago
- A getattr and setattr that works on nested objects, lists, dicts, and any combination thereof without resorting to eval☆19Feb 18, 2022Updated 4 years ago
- stripo-plugin☆19Mar 30, 2026Updated last week
- MutAP: A prompt_based learning technique to automatically generate test cases with Large Language Model☆54Mar 7, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Challenge infrastructure used for the DownUnderCTF competition☆25Sep 8, 2025Updated 7 months ago
- ☆45Sep 8, 2023Updated 2 years ago
- ☆15Jun 28, 2022Updated 3 years ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Aug 14, 2025Updated 7 months ago
- ☆25Jan 21, 2022Updated 4 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆26Nov 30, 2021Updated 4 years ago
- 一些爱发电缺少的功能☆12Mar 25, 2025Updated last year
- ARVO: an Atlas of Reproducible Vulnerabilities in Open source software.☆67Feb 16, 2026Updated last month
- Virtual Serial Port (via USB-IP) to TCP Socket☆11May 3, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- Public challenges from past UMDCTF competitions☆34May 3, 2025Updated 11 months ago
- Testability Pattern Catalogs for SAST☆34Feb 18, 2025Updated last year
- SEETF 2022 Public Challenge Files, Sources, and Solutions☆28Jul 27, 2022Updated 3 years ago
- CTF challenge per-team instance runner☆42Oct 30, 2025Updated 5 months ago
- 利用强化学习方法 DQN 生成基于机器学习的恶意流量检测模型☆29Oct 27, 2021Updated 4 years ago
- ☆38Jun 23, 2025Updated 9 months ago
- PatchEval: A New Benchmark for Evaluating LLMs on Patching Real-World Vulnerabilities☆195Mar 11, 2026Updated 3 weeks ago
- A powerful GNOME Shell clipboard manager with history, encryption, image support, favorites, and 12 themes. Follows system dark/light mod…☆31Mar 30, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Nim library for scraping google search results☆15Mar 17, 2022Updated 4 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- TC39 proposal for mitigating prototype pollution☆53Aug 29, 2023Updated 2 years ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨☆46Jul 18, 2024Updated last year
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆57Oct 25, 2023Updated 2 years ago
- TheHulk is a dynamic analysis tool designed to detect and exploit DOM Clobbering vulnerabilities.☆91Aug 25, 2025Updated 7 months ago
- attachments and (some) writeups/source code for RWCTF 5th☆59Jan 10, 2023Updated 3 years ago