composer_liu_ming's repositories
-
study the network security
ALAE
[CVPR2020] Adversarial Latent Autoencoders
Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites
The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Therefore, it is usually the primary target for most of the malicious attacks such as DNS Poisoning and Rogue DNS servers. With the help of 0x20 bit encoding, the problem of DNS Poisoning is mitigated to quite a large e
AoiAWD
AoiAWD-专为比赛设计,便携性好,低权限运行的EDR系统。
awd-platform
platform for awd
Awesome-Backbones
Integrate deep learning models for image classification | Backbone learning/comparison/magic modification project
BugRepoter_0x727
BugRepoter_0x727(自动化编写报告平台)根据安全团队定制化协同管理项目安全,可快速查找历史漏洞,批量导出报告。
casia1groundtruth
Groundtruth images of tampering dataset CASIA 1.0
Cost-Assignment-based-Adaptive-Active-Forensics-Scheme-for-Image-Tampers
The offical sourch code for Papers "Cost Assignment based Adaptive Active Forensics Scheme for Image Tampers"
DMD2018
Detection of malicious domain names using machine learning and deep learning models
gwhatweb
CMS识别 python gevent实现
Hello-world
one step to define program world
HelloGit
Config files for my GitHub profile.
HiDDeN
Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei
HVVault
梳理【护网高利用率POC】并集成Nuclei模板仓库,针对解决网上同一资产漏洞一键检测工具参次不齐问题。
kornia
Open Source Differentiable Computer Vision Library
MathModel
研究生数学建模,本科生数学建模、数学建模竞赛优秀论文,数学建模算法,LaTeX论文模板,算法思维导图,参考书籍,Matlab软件教程,PPT
ml-quant
Research publication code for "Least Squares Binary Quantization of Neural Networks"
MVSS-Net
code for Image Manipulation Detection by Multi-View Multi-Scale Supervision
OA-EXPTOOL
OA综合利用工具,集合将近20款OA漏洞批量扫描
pytorch-CycleGAN-and-pix2pix
Image-to-Image Translation in PyTorch
Savior
渗透测试报告自动生成工具!
Scrapegraph-ai
Python scraper based on AI
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
seq3
Source code for the NAACL 2019 paper "SEQ^3: Differentiable Sequence-to-Sequence-to-Sequence Autoencoder for Unsupervised Abstractive Sentence Compression"
sqli-labs
SQLI labs to test error based, Blind boolean based, Time based.
SteganoGAN
SteganoGAN is a tool for creating steganographic images using adversarial training.
vulmap
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能