jackfromeast / DES_algorithm
使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns
☆10Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for DES_algorithm
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆52Updated 2 years ago
- IVA-Xception model which can achieve high performance in identifying multiple birds from overlapping bird sounds recordings based on IVA …☆14Updated 3 years ago
- ☆43Updated last year
- 一个搜索网络安全领域顶会论文的小工具☆58Updated 2 weeks ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆109Updated 3 years ago
- A collection of security papers on top-tier publications☆35Updated last month
- Academic Papers about LLM Application on Security☆106Updated 5 months ago
- ☆35Updated last year
- A curated list of malware-related papers.☆22Updated 8 months ago
- FirmSec Dataset☆29Updated 2 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆37Updated last year
- FirmSec Dataset☆10Updated 3 years ago
- ☆21Updated 8 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆60Updated last month
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆19Updated 3 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆13Updated 8 months ago
- ☆18Updated 2 months ago
- MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps.☆26Updated last year
- VulDeePecker algorithm implemented in Python☆105Updated 5 years ago
- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs - DIMVA '24☆11Updated 2 months ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆197Updated 6 months ago
- 基于深度学习的恶意软件检测研究;MalConv;☆82Updated 2 years ago
- ☆22Updated last month
- Data Mining for Cybersecurity☆74Updated 2 years ago
- To store some files that I prepared for recommended postgraduate.☆14Updated 5 years ago
- A cms system for Sichuan University CTF Association☆11Updated 4 years ago
- 基于图神经网络的切片级漏洞检测及解释方法☆44Updated 3 weeks ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆135Updated last year