rakshithShetty / A4NT-author-maskingLinks
Repository for author masking
☆12Updated 7 years ago
Alternatives and similar repositories for A4NT-author-masking
Users that are interested in A4NT-author-masking are comparing it to the libraries listed below
Sorting:
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- PDF Malware Parser☆20Updated 9 years ago
- ☆80Updated 6 years ago
- ☆12Updated 4 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- A set of templates for different academic venues.☆29Updated 6 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- P2P botnet detection by tracking conversations☆28Updated 10 years ago
- Spectre exploit☆55Updated 7 years ago
- Implementations of the Simon and Speck Block Ciphers☆101Updated 7 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Updated 4 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 7 years ago
- A library for adversarial classifier evasion☆43Updated 11 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Updated 6 years ago
- A tiny KVM hypervisor written in Python☆67Updated 6 years ago
- QEmu backend for avatar²☆21Updated 8 months ago
- ☆25Updated 10 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Code for cracking passwords with neural networks☆241Updated 6 years ago
- How fast can we brute force a 64-bit comparison?☆54Updated 5 years ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago