There are no reviews yet. Be the first to send feedback to the community and the maintainers!
buffer-overflow-attack
This is an example buffer overflow attack on a small vulnerable C program.phishing-detection
Train a simple decision tree classifier to detect websites used for phishingmultiple-teachers-for-privacy
This repository contains binaries for the multiple teacher approach to learning differential private ML models: https://arxiv.org/abs/1610.05755dictionary-attack
A simple example of a dictionary attack coded in Javabigram-next-word-predictor
A simple bigram next word predictor implemented in Python.tips
(Organized) repository of tips for future referencedouble-des-meet-in-the-middle
Implementation of a DoubleDES cipher along with a Meet In The Middle attackieee-boilerplate
Boilerplate for IEEE conference submissionsinterviews
Technical Interview Problems with Solution Source Codecomputer-security-class
Notes from computer security class by Trent JaegerLove Open Source and this site? Check out how you can help us