ufidon / softsecLinks
course materials and references for its450
☆33Updated 3 years ago
Alternatives and similar repositories for softsec
Users that are interested in softsec are comparing it to the libraries listed below
Sorting:
- Source code for my books☆163Updated 2 years ago
- SEED Labs developed in the last 20 years.☆861Updated 3 weeks ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆115Updated 4 months ago
- Solutions for Exploit-Exercises Protostar☆75Updated 10 years ago
- ☆10Updated 5 years ago
- CTF challenges designed and implemented in machine learning applications☆166Updated last year
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆122Updated 5 years ago
- Stop Learning, Start Hacking☆139Updated 2 years ago
- Papers I have collected and read in undergraduate and graduate period☆52Updated 2 years ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Updated last year
- Dataset with labeled benign and malicious files 🗃️☆133Updated 2 years ago
- 澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF☆36Updated 2 years ago
- 💻 CTF Heaven☆277Updated 5 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆232Updated 2 months ago
- A large-scale database of malicious software images☆48Updated 4 years ago
- Writeups/solutions☆99Updated 5 years ago
- ☆79Updated 4 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆84Updated 7 months ago
- A curated list of research resources in automated vulnerability detection (AVD)☆33Updated 9 months ago
- SEETF 2022 Public Challenge Files, Sources, and Solutions☆28Updated 3 years ago
- An interactive module to help you learn how to fuzz your first target☆185Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.☆197Updated 4 years ago
- course materials and references☆29Updated last year
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆288Updated 9 months ago
- Hayden Housen's solutions to the 2021 PicoCTF Competition☆55Updated last year
- Solutions and discussions from the Software Security course on Coursera. Open for collaboration and knowledge sharing.☆41Updated last month
- Writeups for each ctf we have partecipated☆40Updated 2 years ago
- ☆23Updated 9 years ago
- ☆15Updated 2 years ago