Source code for my books
☆172Apr 17, 2023Updated 2 years ago
Alternatives and similar repositories for BookCode
Users that are interested in BookCode are comparing it to the libraries listed below
Sorting:
- SEED Labs developed in the last 20 years.☆924Nov 4, 2025Updated 4 months ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Tools to make life easier ^_^☆13Aug 21, 2025Updated 6 months ago
- 一个fuzzdb扩展库 弱密码和各语言网站后台/漏洞/备份文件路径☆13Feb 10, 2019Updated 7 years ago
- ☆18Sep 1, 2018Updated 7 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 7 years ago
- Teeny Tiny Compiler built in Rust☆16Dec 9, 2023Updated 2 years ago
- FPGA design and test files for ChipWhisperer-Husky.☆19Feb 19, 2026Updated 2 weeks ago
- A VPN implemented over TLS/SSL written in C☆20Apr 11, 2024Updated last year
- pwn database☆18Jan 6, 2019Updated 7 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Feb 2, 2025Updated last year
- Qemu Emulator for TTGO TDisplay esp32 board.☆26Feb 9, 2026Updated last month
- A Coverage-Based fuzzing tools☆23Aug 9, 2021Updated 4 years ago
- aurora-d☆20Apr 24, 2022Updated 3 years ago
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- ☆61Jun 20, 2022Updated 3 years ago
- ☆33Jan 11, 2018Updated 8 years ago
- Secure AES128 Encryption Implementation for ATmega8515☆35Feb 15, 2021Updated 5 years ago
- A System for Debloating C/C++ Programs☆31Jul 16, 2021Updated 4 years ago
- All Files, Scripts, and exploits can be found here☆74Apr 16, 2021Updated 4 years ago
- Curated list of problems to strengthen the C programming concepts along with some software engineering related modules like Linux fundame…☆41Updated this week
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆34Apr 27, 2020Updated 5 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- Toolkit for Dynamic Python code manipulations☆11Oct 19, 2024Updated last year
- Framework for studying cryptographic hash functions using SAT.☆10Dec 21, 2021Updated 4 years ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- Scripts & Code patches for analyzing/emulating/copying FM1208 CPU Cards (读取复制 SAK28 CPU卡 FM1208)☆20Mar 7, 2025Updated last year
- Personal Notes About Everything.☆549May 6, 2021Updated 4 years ago
- ☆13Jul 22, 2022Updated 3 years ago
- 精简之后的老东西☆35Dec 31, 2015Updated 10 years ago
- A minimal bash tool to convert video files to any other supported media files using yt-dlp and ffmpeg.☆22Jan 11, 2026Updated last month