"Computer Science, a programmer's perspective 3th edition" lab code
☆33Nov 4, 2024Updated last year
Alternatives and similar repositories for CSAPP-Lab
Users that are interested in CSAPP-Lab are comparing it to the libraries listed below
Sorting:
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- 🗡️ Dagger2 with MVP android.☆10Aug 21, 2019Updated 6 years ago
- Simple Python 3 HTTP server for logging all GET and POST requests☆10Jun 16, 2020Updated 5 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- 高版本java各种JNDI Bypass方法复现+相应RMI服务端代码☆14Mar 23, 2024Updated last year
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- 全国主流CDN厂商cname域名汇总合集☆13Dec 11, 2024Updated last year
- A .net lib to generate an native coff executable☆13Apr 30, 2015Updated 10 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Example project using universal links as deeplinks to switch iOS apps.☆13Aug 10, 2024Updated last year
- My Blog☆12Feb 4, 2026Updated last month
- ☆13Jun 26, 2021Updated 4 years ago
- redis主从复制windows和Linux 6.x☆11Nov 15, 2021Updated 4 years ago
- 🚀 Rapid AI-driven prototyping in Python using GPT-3, ChatGPT, and more 🤖. Provide doctests, and let the AI do the rest!☆14Sep 23, 2025Updated 5 months ago
- Um simples clone do Discord temático de Fullmetal Alchemist☆10Feb 28, 2023Updated 3 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Create a VPN killswitch with iptables☆15Jul 28, 2020Updated 5 years ago
- 渗透测试常规操作记录☆11Dec 11, 2020Updated 5 years ago
- ☆12May 28, 2021Updated 4 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- ☆10Dec 25, 2024Updated last year
- ☆11May 25, 2024Updated last year
- 用codeql分析grafana最新任意文件读取☆11Dec 10, 2021Updated 4 years ago
- Agony magic revision Godzilla, used to avoid anti -virus software monitoring☆14Jan 15, 2025Updated last year
- 外网信息收集-思维导图☆17Jul 17, 2023Updated 2 years ago
- ☆21Jun 8, 2025Updated 8 months ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- (CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞☆12Apr 28, 2021Updated 4 years ago
- This is Korean wordle. 단어들(Danwordle)☆13Jan 29, 2022Updated 4 years ago
- 渗透 超全面的渗透资料💯 包含:0day,xss,sql注入,提权……☆13Feb 22, 2019Updated 7 years ago
- Windows process injection methods☆18Jul 18, 2021Updated 4 years ago
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆58Jul 9, 2024Updated last year
- The implementation of RAG-LER☆17Sep 19, 2025Updated 5 months ago
- 基于爬虫式对FoFa数据进行爬取,无需FoFa高级会员和F币,未登录,普通用户,基础会员,高级会员均可使用。☆10Jan 15, 2022Updated 4 years ago
- Spiking Recognition (SpiReco)☆13Apr 3, 2024Updated last year
- ☆13Jan 12, 2022Updated 4 years ago
- 基于原本的supershell进行二次开发,增加了一些功能和升级了rssh☆28Jul 7, 2025Updated 8 months ago
- log4j tomcat web漏洞环境☆11Dec 10, 2021Updated 4 years ago