Security papers about software vulnerabilities and exploits
☆14Jan 16, 2019Updated 7 years ago
Alternatives and similar repositories for Security-Papers
Users that are interested in Security-Papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆20Jun 7, 2025Updated 9 months ago
- This is a simple library for Delphi that provides a CancellationTokenSource and CancellationToken much like those in .NET☆20Dec 17, 2025Updated 3 months ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Aug 24, 2020Updated 5 years ago
- pentestMCP: AI-Powered Penetration Testing via MCP, an MCP designed for penetration testers.☆51Mar 21, 2026Updated last week
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Oct 3, 2017Updated 8 years ago
- Companion project with code for "Deadlocks in non-hierarchical CSP" blog post☆21Jan 14, 2019Updated 7 years ago
- angr源码分析☆34Jan 6, 2020Updated 6 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 4 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Micro-benchmarking Framework for Python Type Inference Tools☆38Nov 13, 2025Updated 4 months ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- A group of students who are interested in Compilers, and they want to improve themselves together.☆25Aug 23, 2022Updated 3 years ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆70Jan 19, 2026Updated 2 months ago
- ☆13Mar 6, 2023Updated 3 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- LLVM dataflow analysis framework; Reaching Definition Analysis; Liveness Analysis, May-point-to Definition Analysis ; inter-procedural m…☆26Mar 15, 2020Updated 6 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 5 months ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- https://hackmd.io/s/r1SgsdF3X☆10Dec 21, 2018Updated 7 years ago
- Caputre the flag with Large Language Models☆28Aug 5, 2025Updated 7 months ago
- A simple CUDA vector addition program☆20Jul 19, 2022Updated 3 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- Library to serialize and deserialize Syn syntax trees.☆27Mar 12, 2026Updated 2 weeks ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Jan 16, 2019Updated 7 years ago
- ☆26Updated this week
- Convert notes from Weread into a csv that can be merged with notion table.☆14May 10, 2022Updated 3 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- Most influential papers in programming languages☆59Jan 20, 2025Updated last year
- Linux EAC reversal (.so)☆26Jul 22, 2018Updated 7 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Binary Ninja plugin for automating VMProtect analysis☆62Dec 2, 2022Updated 3 years ago
- Переводилка с гражданского шрифта на ЦСЯ☆21Mar 12, 2026Updated 2 weeks ago
- ☆11Sep 6, 2024Updated last year