user163 / image-encryption
Encryption / Decryption of images with AES-CBC/ECB
☆18Updated 4 years ago
Alternatives and similar repositories for image-encryption
Users that are interested in image-encryption are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- 可信计算实验☆10Updated 3 years ago
- Source code for my books☆163Updated 2 years ago
- ☆16Updated 10 months ago
- ☆34Updated 2 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆30Updated last year
- This repository is a dockerized PHP application containing some file upload vulnerability challenges (scenarios).☆49Updated 2 years ago
- A list of attacks or malware using steganography or information hiding☆64Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆88Updated last month
- ☆30Updated 2 years ago
- Raspbian with OP-TEE support.☆26Updated 6 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆68Updated last year
- Malicious Network Traffic Analysis with AI☆14Updated last year
- ☆19Updated 4 years ago
- ☆85Updated last month
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆234Updated last month
- Website for Research Artifacts from the Security Community☆18Updated 3 weeks ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆146Updated 2 months ago
- A large-scale database of malicious software images☆47Updated 3 years ago
- Stop Learning, Start Hacking☆133Updated 2 years ago
- All challenges from DiceCTF 2023☆72Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆29Updated 3 months ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Updated 5 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago
- ☆44Updated last year
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆50Updated last year
- We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environme…☆48Updated 7 months ago
- ☆26Updated 2 years ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆76Updated last month