z-a-f / MOOCsLinks
☆22Updated 7 years ago
Alternatives and similar repositories for MOOCs
Users that are interested in MOOCs are comparing it to the libraries listed below
Sorting:
- Source code for my books☆163Updated 2 years ago
- A pure Python implementation of AES☆203Updated 4 years ago
- Attacks against QUIC (CVE-2022-30591)☆25Updated 2 years ago
- This project is Malware detection API using ML and CNN techniques☆24Updated 2 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Assignments for Coursera's Cryptography I course by Dan Boneh☆123Updated 10 years ago
- Stop Learning, Start Hacking☆139Updated 2 years ago
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆23Updated 3 years ago
- SEED Labs developed in the last 20 years.☆861Updated 3 weeks ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆133Updated last week
- A collection of awesome github repositories about security☆62Updated 3 months ago
- Malicious Network Traffic Analysis with AI☆17Updated last year
- seed security labs 总结与记录☆44Updated last year
- Records & Reports for Seed-project☆95Updated 4 years ago
- Multi-class malware classification using Deep Learning☆78Updated 4 years ago
- Machine Learning in Cybersecurity☆86Updated 3 months ago
- 一个基于Netfilter、Netlink的Linux传输层状态检测防火墙,支持NAT,仅用于学习与交流(华中科技大学2021学年网络安全课程设计项目)☆58Updated last year
- A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆74Updated 2 years ago
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆122Updated 5 years ago
- ☆33Updated 5 years ago
- 同济大学 现代密码学 / 信息安全数学基础 辅助工具☆37Updated 4 years ago
- A large-scale database of malicious software images☆48Updated 4 years ago
- A Python framework for creating emulation of the Internet.☆254Updated this week
- 初学者怎样学习密码学Cryptography☆126Updated 3 years ago
- Capture the flag challenges☆103Updated 5 months ago
- Writeups to Crypto Challenges in CTFs☆40Updated 6 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Updated 3 years ago
- Python implementation of the message digest 5 (MD5) algorithm☆39Updated 2 years ago
- course materials and references☆29Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆55Updated 3 years ago