Recent academic papers related to cybercrime
☆18Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for cybercrime-papers
Users that are interested in cybercrime-papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Feb 2, 2021Updated 5 years ago
- ☆10Sep 4, 2020Updated 5 years ago
- LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing☆25Mar 4, 2026Updated last month
- 7-zip-jbinding optimized for Android, supports SAF☆13Oct 20, 2025Updated 6 months ago
- ☆41Jul 6, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 4 years ago
- This is the dataset for our TSE paper "Defining Smart Contracts Defects on Ethereum"☆17Dec 28, 2024Updated last year
- Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting (TIFS Accepted).☆50Feb 28, 2023Updated 3 years ago
- A simple RFC 2136 dynamic DNS updater☆15Apr 17, 2026Updated last week
- HTTP/HTTPS/WebSocket proxy server for viewing and intercepting web traffic.☆15Apr 7, 2024Updated 2 years ago
- A reading group for system verification papers☆10Sep 28, 2023Updated 2 years ago
- ☆21Apr 17, 2023Updated 3 years ago
- Ethernaut Motorbike Solution (After Dencun Upgrade)☆18Nov 4, 2025Updated 5 months ago
- ☆47Dec 7, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Jun 21, 2020Updated 5 years ago
- The smart contract security training ground for developers, security researchers and educators.☆13Sep 24, 2024Updated last year
- Smart contract front-running vulnerability benchmark☆25Dec 11, 2023Updated 2 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Triton based symbolic emulator☆16Oct 30, 2022Updated 3 years ago
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Oct 16, 2020Updated 5 years ago
- ☆24May 13, 2024Updated last year
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Dec 8, 2024Updated last year
- An empirical study on patch correctness☆15Nov 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆61Jun 20, 2022Updated 3 years ago
- Password Similarity Detection Using Deep Neural Networks. This project was the case study of my bachelor's thesis.☆22Apr 8, 2021Updated 5 years ago
- ☆36Aug 25, 2021Updated 4 years ago
- MANDO-GURU, a deep graph learning-based tool, aims to accurately detect vulnerabilities in smart contract source code at both coarse-grai…☆30Feb 28, 2023Updated 3 years ago
- The LLVM Infrastructure Working Group☆18Aug 31, 2022Updated 3 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- Ray Tracing in One Weekend with DXR☆17Jun 18, 2024Updated last year
- ☆11Mar 11, 2015Updated 11 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Precision-guided context sensitivity for pointer analysis