user163 / image-encryptionLinks
Encryption / Decryption of images with AES-CBC/ECB
☆18Updated 4 years ago
Alternatives and similar repositories for image-encryption
Users that are interested in image-encryption are comparing it to the libraries listed below
Sorting:
- A Python framework for creating emulation of the Internet.☆255Updated last week
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆173Updated 4 years ago
- ☆22Updated 7 years ago
- Source code for my books☆163Updated 2 years ago
- Attacks against QUIC (CVE-2022-30591)☆25Updated 2 years ago
- ☆32Updated 5 years ago
- Dataset with labeled benign and malicious files 🗃️☆133Updated 2 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- SEED Labs developed in the last 20 years.☆861Updated 3 weeks ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆24Updated 2 years ago
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- A logic-based enterprise network security analyzer☆127Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆114Updated 4 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆48Updated 10 months ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆246Updated 3 years ago
- ☆24Updated 2 years ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆100Updated 3 weeks ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆40Updated 3 months ago
- 基于深度学习的恶意软件检测研究;MalConv;☆104Updated 3 years ago
- A curated list of malware-related papers.☆31Updated last year
- Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC)…☆16Updated 5 months ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- Source code and solutions for UofT's 2024 Capture the Flag Competition.☆19Updated 8 months ago
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆122Updated 5 years ago
- Files + Solutions for DownUnderCTF 2024 Challenges☆115Updated last year
- CTF challenges designed and implemented in machine learning applications☆166Updated last year
- Challenges and writeups for PatriotCTF 2023☆25Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆51Updated 2 weeks ago
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆138Updated 6 months ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago