user163 / image-encryptionLinks
Encryption / Decryption of images with AES-CBC/ECB
☆18Updated 4 years ago
Alternatives and similar repositories for image-encryption
Users that are interested in image-encryption are comparing it to the libraries listed below
Sorting:
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Updated 2 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆29Updated 7 months ago
- A machine learning malware analysis framework for Android apps.☆128Updated last year
- ☆31Updated 2 years ago
- ☆24Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆20Updated this week
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago
- ☆10Updated 3 months ago
- A tool for automatically identifying syscall-guard variables☆34Updated 3 weeks ago
- A list of data-only attacks☆19Updated this week
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆322Updated last year
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆12Updated 2 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆26Updated last year
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆62Updated 4 months ago
- Partitioned Unit Memory Management☆14Updated 2 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆13Updated last year
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆53Updated 3 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆70Updated 10 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆91Updated last month
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆234Updated last month
- ☆18Updated 5 years ago
- A curated list of malware-related papers.☆28Updated last year
- Records & Reports for Seed-project☆95Updated 4 years ago
- A collection of security papers on top-tier publications☆43Updated 3 weeks ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆113Updated last year
- ☆44Updated last year
- FirmSec Dataset☆34Updated 2 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆47Updated 11 months ago
- A comprehensive malware detection and dynamic analysis system, designed to analyse malware samples and benign files & classify them using…☆11Updated last year