kevin-w-du / BookCodeLinks
Source code for my books
☆163Updated 2 years ago
Alternatives and similar repositories for BookCode
Users that are interested in BookCode are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆855Updated 3 weeks ago
- A Python framework for creating emulation of the Internet.☆253Updated this week
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆105Updated 4 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆738Updated last week
- 每日论文推荐☆293Updated 4 years ago
- Records & Reports for Seed-project☆95Updated 4 years ago
- Chinese translation of the SEED Labs☆53Updated 10 months ago
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆122Updated 5 years ago
- (与本人兴趣强相关的)各种安全or计算机资料收集☆753Updated 3 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- IoT Security Reading List☆63Updated 5 years ago
- Popular Android malware datasets☆161Updated 6 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆369Updated 2 years ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆348Updated last month
- Data Mining for Cybersecurity☆78Updated 3 years ago
- 2019 and 2020 Top Conference Paper☆13Updated 4 years ago
- course materials and references for its450☆33Updated 3 years ago
- Contains Attack labs☆150Updated 6 years ago
- An interactive module to help you learn how to fuzz your first target☆182Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆167Updated last month
- A logic-based enterprise network security analyzer☆126Updated 2 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆167Updated last year
- 全国大学生信息安全竞赛作品收集☆70Updated 7 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆331Updated 4 years ago
- A protocol reverse engineering tool for industrial binary protocol based on pin tool☆17Updated 4 years ago
- ☆31Updated 4 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Updated 5 years ago
- Writeups/solutions☆98Updated 5 years ago
- Curated list of classic fuzzing books, papers about fuzzing at information security top conferences over the years, commonly used fuzzing…☆362Updated last week