poyu39 / nuc140View external linksLinks
IECS213 微處理機系統
☆12Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for nuc140
Users that are interested in nuc140 are comparing it to the libraries listed below
Sorting:
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 6 months ago
- ☆10Apr 13, 2025Updated 10 months ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated last year
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 5 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 3 months ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- ☆23Jan 27, 2026Updated 2 weeks ago
- Kernel Information Disclosure☆32Jan 13, 2026Updated last month
- ☆19May 1, 2025Updated 9 months ago
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Jul 23, 2024Updated last year
- Connect your Cursor account to OpenCode and use it within OpenCode TUI!☆23Jan 27, 2026Updated 2 weeks ago
- Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)☆19Aug 23, 2024Updated last year
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆28Mar 27, 2025Updated 10 months ago
- My public CTF challenge☆17Aug 25, 2025Updated 5 months ago
- Windows Win32 Kernel Subsystem☆35Aug 23, 2025Updated 5 months ago
- RAPID: Training-free Retrieval-based Log Anomaly Detection with PLM considering Token-level information☆18Jul 11, 2024Updated last year
- Pwn CTF writeups including challenges and solutions☆18Dec 21, 2020Updated 5 years ago
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- ☆21Apr 6, 2025Updated 10 months ago
- ReCopilot IDA☆49Jan 12, 2026Updated last month
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆23Jan 17, 2024Updated 2 years ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆34Jan 10, 2025Updated last year
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- CVE-2013-2028 python exploit☆20Jun 27, 2020Updated 5 years ago
- Code for my C2022 course☆23Nov 26, 2024Updated last year
- ☆28Jan 10, 2024Updated 2 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- ☆23May 6, 2024Updated last year
- Free and open binary exploitation course for 2024 NCKUCTF☆43Oct 2, 2024Updated last year
- ☆25Jun 25, 2021Updated 4 years ago
- how to get a few pwn points if you don't know how to pwn☆29Jul 6, 2019Updated 6 years ago
- ☆40Apr 23, 2025Updated 9 months ago
- humor-great-design☆42Mar 5, 2025Updated 11 months ago