kevin-w-du / BookCodeLinks
Source code for my books
☆164Updated 2 years ago
Alternatives and similar repositories for BookCode
Users that are interested in BookCode are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆866Updated 2 weeks ago
- Records & Reports for Seed-project☆94Updated 4 years ago
- A Python framework for creating emulation of the Internet.☆255Updated this week
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆119Updated 5 months ago
- Chinese translation of the SEED Labs☆55Updated last year
- ☆180Updated last year
- 每日论文推荐☆293Updated 4 years ago
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆123Updated 5 years ago
- This repository is used to analysis the shared resources of different containers☆31Updated 11 months ago
- Personal Notes About Everything.☆527Updated 4 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆66Updated last year
- A logic-based enterprise network security analyzer☆129Updated 2 years ago
- Data Mining for Cybersecurity☆78Updated 3 years ago
- Research paper collection for Linux kernel security from top security conferences.☆77Updated 7 years ago
- (与本人兴趣强相关的)各种安全or计算机资料收集☆755Updated 3 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆168Updated last year
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆189Updated last year
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆24Updated 2 years ago
- IoT Security Reading List☆63Updated 5 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆756Updated this week
- An interactive module to help you learn how to fuzz your first target☆185Updated last year
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆432Updated 3 years ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆353Updated 2 months ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆222Updated 2 years ago
- Recent security papers on firmware analysis☆76Updated 4 years ago
- DiAne is a smart fuzzer for IoT devices☆41Updated last year
- Contains Attack labs☆151Updated 6 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆26Updated last year