ufidon / softsecLinks
course materials and references for its450
☆32Updated 3 years ago
Alternatives and similar repositories for softsec
Users that are interested in softsec are comparing it to the libraries listed below
Sorting:
- Source code for my books☆163Updated 2 years ago
- Solutions for Exploit-Exercises Protostar☆74Updated 10 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆69Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆76Updated 5 months ago
- Contains Attack labs☆150Updated 6 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆97Updated 2 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆186Updated 10 months ago
- Code repository for "Machine Learning For Red Team Hackers".☆33Updated 5 years ago
- There are some papers about fuzzing. I record them by Xmind. Welcome to contact to me.☆274Updated 5 years ago
- ☆10Updated 5 years ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆27Updated 10 months ago
- ☆56Updated last month
- Udemy – Linux Heap Exploitation☆43Updated 4 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆54Updated last year
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆83Updated 2 months ago
- vulnerability detection in python source code with LSTM networks☆144Updated 5 years ago
- Writeups for each ctf we have partecipated☆40Updated 2 years ago
- ☆31Updated 2 months ago
- Dataset with labeled benign and malicious files 🗃️☆127Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆154Updated this week
- ☆23Updated last year
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆345Updated last week
- ☆19Updated 3 years ago
- My solutions to RPISEC's Modern Binary Exploitation course lab☆14Updated 7 years ago
- My write-ups from various CTFs☆118Updated last year
- ☆178Updated last year
- Malware detection using CNN☆12Updated 6 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆225Updated last week