Examples from the book 程序員的自我修養
☆55Sep 16, 2013Updated 12 years ago
Alternatives and similar repositories for xiuyang
Users that are interested in xiuyang are comparing it to the libraries listed below
Sorting:
- totally unofficial git repo containing sources for the CppMem tool available at http://svr-pes20-cppmem.cl.cam.ac.uk/cppmem/help.html and…☆26Feb 15, 2013Updated 13 years ago
- <程序员的自我修养> 源代码☆65Jul 6, 2013Updated 12 years ago
- openamedia recorder is a android app recording audio/video to a target file.☆17Sep 18, 2014Updated 11 years ago
- The Craft of Writing☆13Dec 21, 2023Updated 2 years ago
- A note of building The GNU C Library(https://www.gnu.org/software/libc/)☆36Nov 21, 2021Updated 4 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆15Jan 5, 2024Updated 2 years ago
- 很好用的tnn classify demo☆11Mar 24, 2021Updated 4 years ago
- C Crypto library supporting DES, AES128, SHA256, CCM-AES128, ECDSA, ECDH, PKCS#1 v1.5☆14Jan 24, 2022Updated 4 years ago
- GraphQL C++ server library at simple way☆12Oct 28, 2020Updated 5 years ago
- 我编译的开源CAN分析软件 cangaroo 的windows编译版本☆15Sep 16, 2021Updated 4 years ago
- ☆15Sep 9, 2020Updated 5 years ago
- For ACL25 paper "WAFFLE: Multi-Modal Model for Automated Front-End Development" - by Shanchao Liang and Nan Jiang and Shangshu Qian and L…☆11May 28, 2025Updated 9 months ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated 2 years ago
- CHIP-8 Emulator written with Python3 and PyGame☆11Jan 6, 2020Updated 6 years ago
- Utility class to monitor directorys via kqueue (Useful for iTunes file sharing on iOS). Example Project is for iOS 5, code works on all p…☆47May 30, 2016Updated 9 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- poc for cve-2017-10661☆11Aug 11, 2017Updated 8 years ago
- It is the demo or test codes of book 《Linux环境编程 —— 从应用到内核》☆26Mar 5, 2017Updated 9 years ago
- ☆10May 16, 2024Updated last year
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Wayland protocol dumper☆24Aug 4, 2022Updated 3 years ago
- A four-dimensional Analysis of Partitioned Approximate Filters☆11Aug 6, 2025Updated 7 months ago
- explore SSD internal☆15Apr 27, 2021Updated 4 years ago
- Ithy Mixture-of-Reasoning merges outputs from multiple LLMs to enhance the quality and completeness for a single aggregated response☆22Mar 15, 2025Updated last year
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- ☆11Mar 14, 2024Updated 2 years ago
- ☆19Oct 11, 2022Updated 3 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- A demo project showing the use of yacc and lex (bison, flex) in a Xcode project☆33Oct 10, 2016Updated 9 years ago
- JVMTI Demo☆11May 4, 2022Updated 3 years ago
- Color palette and swatches for macOS's color picker.☆20Jun 9, 2020Updated 5 years ago
- The Swift version of ThinningCoordinator focus on lighter view controllers.☆18Sep 1, 2018Updated 7 years ago
- ☆17May 19, 2022Updated 3 years ago
- 邮箱开发☆19Jul 11, 2016Updated 9 years ago
- Userspace I/O library for Xilinx AXI S2MM DMA☆11Sep 9, 2025Updated 6 months ago
- local dns cache to anti dns polution in china. inspired by chinadns. writing in ruby☆11Jul 8, 2020Updated 5 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- SImple, common-sense Bitcoin-themed Python ECC library☆15Nov 25, 2017Updated 8 years ago