sliveryou / des-python-cipher
DES 加密算法的 Python3 实现
☆15Updated 6 years ago
Alternatives and similar repositories for des-python-cipher
Users that are interested in des-python-cipher are comparing it to the libraries listed below
Sorting:
- A collection of security papers on top-tier publications☆43Updated last week
- RSA 加密算法的 Python3 实现☆6Updated 6 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆21Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 6 months ago
- A curated list of malware-related papers.☆28Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆44Updated 11 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 2 weeks ago
- 使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns☆10Updated 5 years ago
- ☆11Updated 2 years ago
- ☆26Updated 7 months ago
- AI Model Security Reading Notes☆37Updated 2 months ago
- TensorFlow API analysis tool and malicious model detection tool☆27Updated 2 months ago
- Seminar 2022☆21Updated 2 months ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆11Updated this week
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- To store some files that I prepared for recommended postgraduate.☆15Updated 5 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆146Updated 2 months ago
- This is the official repository for VulHawk.☆69Updated 2 years ago
- The scalable bug search for binaries☆69Updated 8 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆86Updated 2 years ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆30Updated last month
- ☆17Updated 8 months ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆53Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated last month
- 全国大学生信息安全竞赛作品收集☆70Updated 6 years ago
- ☆10Updated 2 years ago
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆116Updated 3 years ago