sliveryou / rsa-python-cipher
RSA 加密算法的 Python3 实现
☆7Updated 6 years ago
Related projects: ⓘ
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆56Updated last month
- A collection of security papers on top-tier publications☆35Updated this week
- 2018年全国大学生信 息安全竞赛作品赛一等奖☆24Updated 4 years ago
- 使用Python实现了一个简单的通信加密模型,包括DES算法、RSA算法和SHA-1算法的实现☆11Updated 5 years ago
- 全国大学生信息安全竞赛作品收集☆60Updated 6 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆40Updated 6 months ago
- FirmSec Dataset☆29Updated 2 years ago
- ☆24Updated 2 years ago
- This is the official repository for VulHawk.☆65Updated last year
- ☆10Updated this week
- 按照三部分对模糊测试入门进行介绍:☆19Updated 4 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆138Updated 8 months ago
- Seminar 2022☆20Updated last month
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆89Updated last week
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆24Updated 9 months ago
- Academic Papers about LLM Application on Security☆94Updated 3 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆31Updated this week
- 每周定期更新论文笔记分享的markdown以及图片☆181Updated 3 years ago
- A curated list of malware-related papers.☆21Updated 6 months ago
- To store some files that I prepared for recommended postgraduate.☆14Updated 5 years ago
- 记录自己在看 afl 源码时候的一些笔记和想法,还有一些自己觉得有意思的魔改。2020年12月2日update:添加混合模糊测试目录☆104Updated 3 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆51Updated 2 years ago
- angr中文版文档☆28Updated 5 years ago
- DES 加密算法的 Python3 实现☆16Updated 6 years ago
- Recent Paper About Bug Detection☆29Updated 4 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆35Updated 9 months ago
- The scalable bug search for binaries☆66Updated 7 years ago
- ☆18Updated 4 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 5 years ago
- 每日论文推荐☆291Updated 3 years ago