Lists (1)
Sort Name ascending (A-Z)
Stars
这是一个用于 Linux 服务器的自动化安全合规检测脚本,遵循中国《GB/T 22239-2019 信息安全技术 网络安全等级保护基本要求》(等保三级)标准。脚本采用纯检测模式,不会修改系统,生成详细的 HTML 报告,覆盖身份鉴别、访问控制、安全审计、入侵防范和网络安全等关键领域。
Small & Fast Vulnerability Scanner Engine based on XRAY YAML Rule | 基于 XRAY YAML 规则的超轻量快速漏洞扫描引擎 | 基于 ANTLR 实现语法分析和完整的 XRAY YAML 规则实现 | 简单的启动参数 | 包含多种反连可用 | 可执行文件体积仅 2 MB
龙芯智优软件是一款针对于国产操作系统智能调优的软件,为帮助运维人员直观可视化对银河麒麟操作系统进行监控调优,系统设计分为管理端应用和服务探针两个核心部分。运维人员通过终端设备访问NGINX服务,通过请求将任务分发到管理端节点,管理端与服务探针进行通讯,发送命令对部署了服务探针的服务器进行监控、数据采集、性能优化,采集的数据返回到管理端。数据实现持久化存储,支持mysql或达梦数据库,使用消息…
Fenrir 是一个基于 MCP 协议与 AST 技术的代码审计工具,旨在解决安全研究与自动化代码审计领域中,面对大规模、结构复杂甚至反编译代码时,传统代码搜索与分析手段效率低、准确性差的问题。
Large Language Models for Software Engineering: A Systematic Literature Review
Advancing Network Security: A Comprehensive Testbed and Dataset for Machine Learning-Based Intrusion Detection
This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Machine Learning Engineering Open Book
Clean, Robust, and Unified PyTorch implementation of popular Deep Reinforcement Learning (DRL) algorithms (Q-learning, Duel DDQN, PER, C51, Noisy DQN, PPO, DDPG, TD3, SAC, ASL)
A complete computer science study plan to become a software engineer.
Some literature published on topics around IoT & Cybersecurity
This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis"…
This is a paper list about Machine Learning for IDSes
A collection of security papers on top-tier publications
[ECCV 2024] The official code for "AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting."
[COLM 2024] JailBreakV-28K: A comprehensive benchmark designed to evaluate the transferability of LLM jailbreak attacks to MLLMs, and further assess the robustness and safety of MLLMs against a var…
AutoAudit—— the LLM for Cyber Security 网络安全大语言模型
This project collected 178 samples of vulnerable smart contracts from various datasets and examined them using multiple smart contract vulnerability detection algorithms. The data has been formatte…