☆33Jan 31, 2021Updated 5 years ago
Alternatives and similar repositories for Safety-Books
Users that are interested in Safety-Books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 8, 2021Updated 5 years ago
- ☆14May 1, 2021Updated 4 years ago
- RISC-V to x86/64 instruction emulator written in C/C++☆11Jan 10, 2022Updated 4 years ago
- 此处是【炼石计划@Java代码审计】知识星球课程目录整理处。 【炼石计划@Java代码审计】专注Java代码审计入门与提升,我将学习路线分成了六个阶段也对应着六大套课程分享。 课程内容不深入开发细节,只关注Java代码审计应学应会的内容。☆32Nov 15, 2022Updated 3 years ago
- Constexpr hash functions for C++☆19May 29, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Check VM/SandBox☆17Mar 23, 2023Updated 3 years ago
- 应急响应工具&文档☆16May 27, 2024Updated last year
- 滴水逆向学习课后代码☆11Mar 13, 2024Updated 2 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- Static Web page hosting☆15Feb 14, 2015Updated 11 years ago
- Windows 10 calculator made with JavaScript.☆11May 3, 2020Updated 5 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- ☆10Apr 8, 2022Updated 3 years ago
- ☆21Feb 19, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- 编译环境AS3.5☆14Jul 16, 2020Updated 5 years ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- Hardware-adapted bridges that support devices using CAN protocol.☆20Jan 12, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- A collection of ReactJS exercises samples based on tutorial videos of Udemy's Modern React with Redux course, created by Stephen Grider☆11Jan 7, 2019Updated 7 years ago
- ☆17May 18, 2022Updated 3 years ago
- ☆40May 10, 2025Updated 10 months ago
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- ☆31Oct 1, 2021Updated 4 years ago
- lua framework for AVG games☆10Nov 11, 2021Updated 4 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- alternative reality☆18Mar 1, 2017Updated 9 years ago
- 收集常用windows版本内核文件☆35Aug 16, 2023Updated 2 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆179Jun 1, 2025Updated 9 months ago
- ☆18Apr 27, 2018Updated 7 years ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆12Jan 24, 2019Updated 7 years ago
- Scripts that filter the output from some Android `dumpsys` commands to make them more readable.☆11Apr 14, 2020Updated 5 years ago
- eBPF C programs injectable in a network card to extract packets' features for detecting different network attacks.☆14May 6, 2022Updated 3 years ago