Repositories
Select a repository to view its commits, contributors, and more.buffer-overflow-attack
This is an example buffer overflow attack on a small vulnerable C program.
phishing-detection
Train a simple decision tree classifier to detect websites used for phishing
dictionary-attack
A simple example of a dictionary attack coded in Java
multiple-teachers-for-privacy
This repository contains binaries for the multiple teacher approach to learning differential private ML models: https://arxiv.org/abs/1610.05755
bigram-next-word-predictor
A simple bigram next word predictor implemented in Python.
tips
(Organized) repository of tips for future reference
double-des-meet-in-the-middle
Implementation of a DoubleDES cipher along with a Meet In The Middle attack
computer-security-class
Notes from computer security class by Trent Jaeger
interviews
Technical Interview Problems with Solution Source Code
ieee-boilerplate
Boilerplate for IEEE conference submissions
programming-languages
Some notes about programming languages
prolog-examples
Some examples to get started with list manipulation in Prolog