☆41Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for jeddak
Users that are interested in jeddak are comparing it to the libraries listed below
Sorting:
- Some script and useful tool for Attack & Defense CTF☆29Jun 27, 2018Updated 7 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Jan 1, 2021Updated 5 years ago
- github军火库☆21May 24, 2017Updated 8 years ago
- 通过agent监控执行的sql语句,对应用代码 0 侵入☆11Jan 3, 2019Updated 7 years ago
- Resources for "Simple Speech Representation Learning from Perceptual Data".☆11Sep 18, 2023Updated 2 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆15Jun 5, 2024Updated last year
- Dev resources of Harmony☆15Mar 4, 2024Updated 2 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆14Sep 10, 2024Updated last year
- ☆20Updated this week
- Better code block highlighting with Prism☆12Mar 10, 2025Updated 11 months ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 9 months ago
- AutoRun Manager is a utility interacts with the Windows Registry to manage startup programs.☆18May 9, 2025Updated 10 months ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago
- some firmware for msm8916☆17May 16, 2022Updated 3 years ago
- H3C iNode Client☆13Jul 26, 2018Updated 7 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- ☆14Nov 5, 2020Updated 5 years ago
- ☆10Updated this week
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 6 years ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- A lightweight, zero-configuration performance profiler for FastAPI applications☆12Nov 29, 2025Updated 3 months ago
- A Python Library for Paillier Encryption using GMPY2 for arithmetic operations☆12Oct 8, 2018Updated 7 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- ☆10Dec 26, 2023Updated 2 years ago
- A NoSQL Document based DB implementation on top of the Ethereum Project blockchain☆11Oct 27, 2017Updated 8 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- ☆11Updated this week
- ☆16Dec 1, 2024Updated last year
- KVM Virtual Machine Introspection Library☆48Dec 13, 2023Updated 2 years ago
- Clone current 2.2.7 from http://h264.code-shop.com as more stable than the native mp4-streamming.☆13Feb 4, 2016Updated 10 years ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- Device Tree Compiler for Windows☆15Aug 9, 2024Updated last year
- LinuxShell编程笔记☆15Aug 29, 2017Updated 8 years ago
- ☆15Jan 5, 2024Updated 2 years ago
- Approximate and vectorized versions of common mathematical functions☆13Mar 1, 2017Updated 9 years ago