Operating System: CPU Scheduling Algorithms
☆10Aug 18, 2020Updated 5 years ago
Alternatives and similar repositories for operating-system
Users that are interested in operating-system are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of All Scheduling Algorithms using Structures in C☆23Jun 13, 2023Updated 2 years ago
- 系統程式System Programming SIC組譯器實作範例☆14Jun 11, 2019Updated 6 years ago
- A C++17 library for parser generation for LALR(1) languages☆13Jan 9, 2023Updated 3 years ago
- This repository contains the Python Programs for various algorithms of Operating Systems☆13Oct 11, 2021Updated 4 years ago
- My Solutions to ABSOLUTE JAVA™ 6th Edition Global Edition☆21Jun 16, 2022Updated 3 years ago
- Java implementation of 4 CPU scheduling algorithms - With GUI Desktop App☆15Oct 19, 2020Updated 5 years ago
- OpenWrt feed containing plan44 packages☆30Jan 2, 2026Updated 2 months ago
- Program for scheduling algorithms in C++☆60Dec 25, 2023Updated 2 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- This repo contains my solution to the "TensorFlow From Basics to Mastery" specialization on Coursera made by Andrew Ng. and Laurence Moro…☆28May 4, 2019Updated 6 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Demo of https://dev.to/audreyhal/push-notifications-with-firebase-in-reactjs-1f9i☆25May 24, 2024Updated last year
- Import Mitre Att&ck into Neo4j database☆39Mar 5, 2026Updated 2 weeks ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Create a Shell Link a.k.a. Shortcut on Windows from command line☆15Jan 6, 2026Updated 2 months ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Basically here I list the best resources I find while learning a new thing or two.☆39Jan 14, 2024Updated 2 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 3 months ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- ☆40Nov 28, 2023Updated 2 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 9 months ago
- MASM Crypto Lib☆16Sep 27, 2015Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Fixed-point arithmetic in C99☆16Oct 4, 2024Updated last year
- ☆43Aug 6, 2021Updated 4 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago