jackiezhu / image-autostitchView external linksLinks
This project is the source code of my thesis for master's degree
☆16Mar 12, 2015Updated 10 years ago
Alternatives and similar repositories for image-autostitch
Users that are interested in image-autostitch are comparing it to the libraries listed below
Sorting:
- Daily statistics of HEX cryptocurrency☆11Sep 4, 2023Updated 2 years ago
- Vortex finder for time-dependent Ginzburg-Landau superconductor simulation data☆11Oct 20, 2020Updated 5 years ago
- Integrated MALware Simulator and Emulator☆13Dec 10, 2013Updated 12 years ago
- LZH compress/decompress☆16Jan 17, 2015Updated 11 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- ☆18Jul 27, 2017Updated 8 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Aug 5, 2016Updated 9 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- ☆24Jan 21, 2022Updated 4 years ago
- A tool which automates and simplifies the on-device fuzzing of MobileSafari.☆24Jan 6, 2016Updated 10 years ago
- IDA recompiler☆31Dec 8, 2014Updated 11 years ago
- Collection of my IDAPython scripts☆33Sep 17, 2015Updated 10 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- [Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.☆30Jul 3, 2017Updated 8 years ago
- Translate regular Assembly into Extended Instructions☆88Oct 9, 2012Updated 13 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 9 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Mar 20, 2016Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆39Sep 2, 2020Updated 5 years ago
- Magnetic stripe spoofer implementing audio waves.☆40Jan 7, 2017Updated 9 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Nov 5, 2021Updated 4 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆54Nov 27, 2018Updated 7 years ago
- FSNS tfrecord generate☆57Jan 28, 2018Updated 8 years ago
- Programmatic disassembly and patching☆69Dec 30, 2016Updated 9 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Jan 19, 2020Updated 6 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆64Nov 5, 2021Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆56Sep 9, 2015Updated 10 years ago
- ☆74Dec 5, 2019Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- BinSourcerer☆92Mar 1, 2022Updated 3 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76May 25, 2016Updated 9 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆82Apr 22, 2020Updated 5 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Oct 25, 2023Updated 2 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Feb 22, 2017Updated 8 years ago
- ☆81Apr 21, 2017Updated 8 years ago