user163 / image-encryptionLinks
Encryption / Decryption of images with AES-CBC/ECB
☆19Updated 5 years ago
Alternatives and similar repositories for image-encryption
Users that are interested in image-encryption are comparing it to the libraries listed below
Sorting:
- Source code for my books☆172Updated 2 years ago
- ☆22Updated 5 years ago
- A Python framework for creating emulation of the Internet.☆265Updated last week
- ☆26Updated 2 years ago
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆23Updated 3 years ago
- A list of attacks or malware using steganography or information hiding☆70Updated last month
- NLP model and tech for cyber security tasks☆86Updated 2 years ago
- seed security labs 总结与记录☆47Updated 2 years ago
- A list of lists involving IoT in general☆150Updated 4 years ago
- Attacks against QUIC (CVE-2022-30591)☆25Updated 3 years ago
- Cryptography course slides at Harbin Institute of Technology☆195Updated last year
- ☆22Updated 7 years ago
- This contains a list of tools for security assessments of android applications.☆43Updated 9 months ago
- SEED Labs developed in the last 20 years.☆910Updated 3 months ago
- Malicious Network Traffic Analysis with AI☆22Updated 2 years ago
- 全国密码技术竞赛论文 latex模板☆19Updated 4 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆133Updated 9 months ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆32Updated 11 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆250Updated 9 months ago
- 一个基于Netfilter、Netlink的Linux传输层状态检测防火墙,支持NAT,仅用于学习与交流(华中科技大学2021学年网络安全课程设计项目)☆56Updated 2 years ago
- 侧信道攻击学习笔记☆31Updated 3 years ago
- Data Mining for Cybersecurity☆78Updated 3 years ago
- ☆13Updated 3 years ago
- Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and g…☆30Updated 5 years ago
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆179Updated 5 years ago
- ☆17Updated last year
- Records & Reports for Seed-project☆97Updated 5 years ago
- SNORT GUI: sniff sniffs the baddies and helps you setup SNORT ids in your network☆28Updated 6 months ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆213Updated 3 months ago