- BeiJing
-
01:23
(UTC -12:00) - https://www.cnblogs.com/zuoanfengxi/
Starred repositories
A neurosymbolic framework for vulnerability detection in code
LuaN1ao (鸾鸟) is an autonomous penetration testing agent based on state awareness and causal reasoning.
📦 Make security testing of K8s, Docker, and Containerd easier.
⚡️SwanLab - an open-source, modern-design AI training tracking and visualization tool. Supports Cloud / Self-hosted use. Integrated with PyTorch / Transformers / verl / LLaMA Factory / ms-swift / U…
A streamlined and customizable framework for efficient large model (LLM, VLM, AIGC) evaluation and performance benchmarking.
Instant Kubernetes-Native Application Observability
Generate bpftrace eBPF programs online with GPT or LLM
基于函数级污点分析的 Java 源代码漏洞审计工具JavaSinkTracer,通过 Model Context Protocol (MCP) 为 AI 助手提供安全分析能力。
[ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG
The design and implementation of an advanced BiLSTM-based model integrated with an attention mechanism for network intrusion detection using the NSL-KDD dataset.
AI-enhanced Intrusion Detection System (IDS) designed to monitor network traffic on your home Wi-Fi network
ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices - NDSS'24
This utility allows users to track changes in a specified file and prints a timestamp when modifications occur.
ML analysis for paper: Intrusion Detection Monitoring for Linux
SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System
a labelled version of the ADFA-LD dataset for HIDS evaluation
A categorized list of system calls used by popular Unix-like operating systems
This document serves as a guide for installing and using DynBox, a dynamic system call sandbox designed to isolate vulnerable programs. It is the accompanying artifact for the OOPSLA 2023 submissio…
TU Delft CSE3000 Research Project code and artifacts