secdr / sec-paperLinks
awesome security paper
☆155Updated 9 years ago
Alternatives and similar repositories for sec-paper
Users that are interested in sec-paper are comparing it to the libraries listed below
Sorting:
- security machine learning☆72Updated 8 years ago
- yarning about data science for white hat security researchers☆117Updated 5 years ago
- machine learning for security☆77Updated 5 years ago
- OpenSource My ImageMagick Fuzzer ..☆297Updated 7 years ago
- https://www.cdxy.me/?p=806☆31Updated 6 years ago
- datacon比赛方向三-攻击源与攻击者分析writeup☆93Updated 6 years ago
- public database for research☆17Updated 8 years ago
- Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret☆108Updated 6 years ago
- SecurityPaper For www.polaris-lab.com☆104Updated 6 years ago
- Resources for CloudNative security research☆32Updated 3 years ago
- 使用机器学习识别WebShell☆127Updated 7 years ago
- A tool for malicious behavior detection in IoT devices☆76Updated 6 years ago
- ☆18Updated 7 years ago
- Machine Learning for Cyber Security☆27Updated 7 years ago
- dns tunnel dectect with CNN☆63Updated 5 years ago
- ☆79Updated 2 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 5 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43Updated 6 years ago
- The python client of passivedns.cn☆97Updated 6 years ago
- Web Input Vector Extractor Teaser☆132Updated 3 years ago
- My AI security testing projects☆41Updated 6 years ago
- ☆46Updated 9 years ago
- A tool to predict vulnerability discovery of binary only programs☆187Updated 7 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Updated 7 years ago
- Deemon is a tool to detect CSRF in web applications. Deemon has been used for the paper "Deemon: Detecting CSRF with Dynamic Analysis and…☆75Updated 7 years ago
- ☆105Updated 7 years ago
- “每周一讲,信息安全基础知识讲堂”由四川大学信息安全研究所漏洞挖掘和利用组同学共同创建,通过每组员每周一讲的形式展开,主要涉及信息安全的基础知识,包括windows安全、移动安全等,此外还对通过该平台对外发布一些小组的研究成果!通 过知识讲座一方面对新同学起到引导作用,另一方…☆37Updated 8 years ago
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆52Updated 7 years ago
- 之Crypto☆43Updated 8 years ago
- ☆33Updated 8 years ago