The ExpressOS kernel
☆17Jun 7, 2013Updated 12 years ago
Alternatives and similar repositories for expressos
Users that are interested in expressos are comparing it to the libraries listed below
Sorting:
- The CloudProxy Tao for Trustworthy Computing☆37Aug 30, 2017Updated 8 years ago
- Refazer: Learning Program Transformations from Examples☆30Mar 25, 2018Updated 7 years ago
- Some code and utilities I've been using to run Android natively in a window on my normal desktop system.☆16Mar 25, 2011Updated 14 years ago
- A free and open source dedicated server for Terraria written in Java.☆10Apr 18, 2012Updated 13 years ago
- Convert Java sources to Actionscript 3☆13Mar 27, 2011Updated 14 years ago
- Random Generator of Btor2 Files☆10Sep 2, 2023Updated 2 years ago
- Analyze experimental data with Programming by Navigation☆17Feb 24, 2026Updated last week
- Alsa and tinyalsa plugins for the parameter-framework☆11Mar 30, 2017Updated 8 years ago
- A fork of Yosys that integrates the CellIFT pass☆13Jul 23, 2025Updated 7 months ago
- A Z80 CPU implemented in Chisel.☆11Sep 20, 2020Updated 5 years ago
- ☆12Nov 2, 2015Updated 10 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- My own "I wish I were at DefCon 25" Hack-a-Thon☆10Aug 26, 2021Updated 4 years ago
- FakeDRM - userspace DRM emulation library☆12Oct 26, 2014Updated 11 years ago
- Wipe or locate Android device on receipt of signed SMS☆12Jun 15, 2016Updated 9 years ago
- Slides for eMMC Hacking 2017☆16Apr 27, 2018Updated 7 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago
- LEC - Logic Equivalence Checking - Formal Verification☆33Updated this week
- ☆22Feb 25, 2026Updated last week
- QEMU bare metal test for validating TrustZone support☆11Apr 23, 2015Updated 10 years ago
- A Coq framework to support structural design and proof of hardware cache-coherence protocols☆14May 7, 2022Updated 3 years ago
- A tutorial for setting up Symbolic Quick Error Detection (SQED) using the model checker, CoSA, on the Ride Core☆12May 24, 2019Updated 6 years ago
- ☆16Aug 1, 2024Updated last year
- ☆11May 21, 2021Updated 4 years ago
- A C#(.NET) implementation of STUN/TURN☆13Nov 6, 2022Updated 3 years ago
- Iodine: Verifying Constant-Time Execution of Hardware☆15Mar 29, 2021Updated 4 years ago
- An automatic recursive function transformer.☆10Aug 12, 2023Updated 2 years ago
- Work towards a "golden model" of the RISC-V calling convention(s)☆10Oct 2, 2017Updated 8 years ago
- Basic Tonic (gRPC) example using Windows Named Pipes as transport☆11Oct 7, 2024Updated last year
- Don't let *them* read your mail. Encrypt it now.☆18Jun 13, 2018Updated 7 years ago
- Wavious Wlink☆12Oct 28, 2021Updated 4 years ago
- ☆18Sep 6, 2014Updated 11 years ago
- buck2 oci rules☆11Nov 20, 2024Updated last year
- A LNCS template for typst☆15Jan 26, 2026Updated last month
- bil verification tool☆12Jun 30, 2022Updated 3 years ago
- DKMS build for missing kmod dummy_hcd in Ubuntu☆12Aug 10, 2017Updated 8 years ago
- JavaScript Public-Key-Pins (HPKP) calculator☆11Jan 2, 2016Updated 10 years ago
- ☆10Dec 28, 2020Updated 5 years ago
- ☆12May 20, 2021Updated 4 years ago