0v3rW4tch / Cryptography-course-designView external linksLinks
CUMT密码学课程设计源代码
☆78Jan 12, 2019Updated 7 years ago
Alternatives and similar repositories for Cryptography-course-design
Users that are interested in Cryptography-course-design are comparing it to the libraries listed below
Sorting:
- CUMT 信息安全专 业(网络安全方向)课程资源☆120May 4, 2021Updated 4 years ago
- Web chanllenge dockerfile and source code☆28Dec 28, 2019Updated 6 years ago
- 简单的pagerank基础上加上稀疏化矩阵化并行化等处理☆12Oct 8, 2019Updated 6 years ago
- 帮助进行三测温一打卡的 Telegram Bot☆12Jan 16, 2021Updated 5 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- Programming oriented AWD framework☆16Feb 11, 2020Updated 6 years ago
- Commodity rush purchase project based on spring-boot☆12Aug 16, 2019Updated 6 years ago
- Android Frida GUI Manager; Android 图形化Frida管理器☆21Nov 19, 2021Updated 4 years ago
- 模拟今日校园每日打卡功能(CUMT)。☆18Oct 18, 2021Updated 4 years ago
- cracker for the llvm-fla-obfuscator☆24Sep 6, 2016Updated 9 years ago
- 2020西湖论剑IOT闯关赛赛后开放资源☆57Nov 25, 2020Updated 5 years ago
- Jilin University Linux User Group☆25Dec 27, 2023Updated 2 years ago
- study PHP and do a demo☆31Jul 10, 2018Updated 7 years ago
- Bitcoin Hush☆12Apr 29, 2020Updated 5 years ago
- A script that automatically redeems a Whiteout Survival gift code for a list of players☆13Oct 14, 2024Updated last year
- 该资源为《软件安全》课程实验及工具,包括PE文件解析、数字签名解析、恶意软件分析、CVE漏洞复现等。希望对您有所帮助~☆79May 21, 2021Updated 4 years ago
- My Blog / Jekyll Theme , SPA and responsive , based on Framework7 and Jekyll.☆10Sep 19, 2016Updated 9 years ago
- An example of a vulnerability in the early JWT token node.js library☆37Apr 6, 2023Updated 2 years ago
- To solve some readflag situation in ctfs☆33Jan 12, 2021Updated 5 years ago
- writeups for XNUCA2020Qualifier☆70Dec 1, 2020Updated 5 years ago
- MagicBox超多功能桌面小电视固件 基于esp32-arduino LVGL的天气时钟、相册、桌面投屏、软路由信息显示、bilibili粉 丝等☆10Feb 21, 2024Updated last year
- Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this ex…☆10Jul 21, 2020Updated 5 years ago
- AWD 自动化攻击框架☆79Jun 21, 2019Updated 6 years ago
- This RocketchatApp validates uploaded images against the Microsoft PhotoDNA cloud service and quarantines those identified as child abuse…☆12Nov 17, 2025Updated 2 months ago
- 2019 第二届安洵杯 题目环境/源码☆86Dec 10, 2019Updated 6 years ago
- 一个灵活的代理池服务。☆34Feb 12, 2019Updated 7 years ago
- encode/decode ft8 signal with wasm-compiled ft8_lib☆11Jun 23, 2024Updated last year
- ☆12Apr 3, 2020Updated 5 years ago
- MMM 2021: Crossed-Time Delay Neural Network for Speaker Recognition☆11Dec 4, 2021Updated 4 years ago
- Minitorch Self-Study Guide (SAIA)☆11Oct 9, 2022Updated 3 years ago
- jar or dex tools☆10Mar 24, 2016Updated 9 years ago
- Short python script to win mathbattle (Telegram gaming bot: https://telegram.org/blog/games)☆10Apr 6, 2021Updated 4 years ago
- 具身智能入门自学☆26Apr 21, 2025Updated 9 months ago
- ☆10Oct 7, 2017Updated 8 years ago
- VLANs on SR Linux are powerful. But different. But powerful. Learn how to use in this interactive tutorial☆10Feb 3, 2025Updated last year
- Android hook by so inject☆11Aug 28, 2017Updated 8 years ago
- ☆11May 10, 2018Updated 7 years ago
- ☆10Feb 23, 2024Updated last year
- 当今海量的移动应用跟人们的生活、工作、学习、休闲、娱乐等方面密切相关,发挥着重要作用。多数APP在安装、更新时,都会向用户申请相关手机权限。多数终端用户缺乏鉴别APP所请求的权限是否合理的能力,并且APP安装使用过程中过度索要权限现象较为普遍,这就给用户数据安全、隐私信息泄…☆13Feb 11, 2020Updated 6 years ago