Security papers about software vulnerabilities and exploits
☆14Jan 16, 2019Updated 7 years ago
Alternatives and similar repositories for Security-Papers
Users that are interested in Security-Papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆20Jun 7, 2025Updated 11 months ago
- SightHouse is a tool designed to assist reverse engineers by retrieving information and metadata from programs and identifying similar fu…☆69Apr 27, 2026Updated last week
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆17Aug 24, 2020Updated 5 years ago
- Cases for high concurrency go programs☆11Jan 18, 2021Updated 5 years ago
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Oct 3, 2017Updated 8 years ago
- Companion project with code for "Deadlocks in non-hierarchical CSP" blog post☆21Jan 14, 2019Updated 7 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 4 years ago
- pentestMCP: AI-Powered Penetration Testing via MCP, an MCP designed for penetration testers.☆60Mar 21, 2026Updated last month
- angr源码分析☆34Jan 6, 2020Updated 6 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- Synchronized Kernel Drawing for 24H2☆23Oct 9, 2025Updated 6 months ago
- A Micro-benchmarking Framework for Python Type Inference Tools☆38Apr 17, 2026Updated 2 weeks ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- ☆13Mar 6, 2023Updated 3 years ago
- 机场签到python脚本☆12Sep 12, 2020Updated 5 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- LLVM dataflow analysis framework; Reaching Definition Analysis; Liveness Analysis, May-point-to Definition Analysis ; inter-procedural m…☆26Mar 15, 2020Updated 6 years ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆75Jan 19, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 6 months ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- https://hackmd.io/s/r1SgsdF3X☆10Dec 21, 2018Updated 7 years ago
- SCTBench: a set of C/C++ pthread benchmarks for evaluating concurrency testing techniques.☆36Dec 16, 2021Updated 4 years ago
- A simple CUDA vector addition program☆21Jul 19, 2022Updated 3 years ago
- Caputre the flag with Large Language Models☆31Aug 5, 2025Updated 9 months ago
- Code and experiments for the paper "A Partitioning Algorithm for Maximum Common Subgraph Problems"☆15Jun 17, 2020Updated 5 years ago
- ☆14Mar 3, 2022Updated 4 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Convert notes from Weread into a csv that can be merged with notion table.☆14May 10, 2022Updated 3 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- Linux EAC reversal (.so)☆26Jul 22, 2018Updated 7 years ago
- ☆11Mar 19, 2022Updated 4 years ago
- Binary Ninja plugin for automating VMProtect analysis☆61Dec 2, 2022Updated 3 years ago