sliveryou / rsa-python-cipher
RSA 加密算法的 Python3 实现
☆7Updated 6 years ago
Alternatives and similar repositories for rsa-python-cipher:
Users that are interested in rsa-python-cipher are comparing it to the libraries listed below
- DES 加密算法的 Python3 实现☆16Updated 6 years ago
- A collection of security papers on top-tier publications☆39Updated last week
- To store some files that I prepared for recommended postgraduate.☆14Updated 5 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆52Updated 3 years ago
- 面向软件安全的污点数据检测系统☆24Updated 8 years ago
- 记录自己在看 afl 源码时候的一些笔记和想法,还有一些自己觉得有意思的魔改。2020年12月2日update:添加混合模糊测试目录☆106Updated 4 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆10Updated 4 months ago
- FirmSec Dataset☆33Updated 2 years ago
- 按照三部分对模糊测试入门进行介绍:☆23Updated 4 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆42Updated 11 months ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Updated 5 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆129Updated 3 months ago
- Recent Paper About Bug Detection☆30Updated 5 years ago
- Academic Papers about LLM Application on Security☆118Updated last week
- ☆24Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆28Updated 4 years ago
- CFG explorer for binaries☆33Updated 3 months ago
- DiAne is a smart fuzzer for IoT devices☆40Updated 10 months ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆92Updated last year
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆14Updated last year
- Build Docker images for unibench☆16Updated 4 years ago
- ☆11Updated 8 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆72Updated 7 months ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- 全国大学生信息安全竞赛作品收集☆65Updated 6 years ago
- ☆14Updated 5 months ago
- A curated list of malware-related papers.☆23Updated 11 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆66Updated 6 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆48Updated 8 months ago
- Lifting network implementation to precise format specification☆23Updated 3 months ago