IECS213 微處理機系統
☆12Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for nuc140
Users that are interested in nuc140 are comparing it to the libraries listed below
Sorting:
- ☆10Apr 13, 2025Updated 10 months ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 7 months ago
- 一個關於資訊社群的集散地☆13Sep 17, 2023Updated 2 years ago
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆41Jan 31, 2026Updated last month
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated 2 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 5 months ago
- Kernel Information Disclosure☆32Jan 13, 2026Updated last month
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- ☆23Jan 27, 2026Updated last month
- C++ Alt syscall hook in 25h2 can be load by KDU☆25Feb 18, 2026Updated 2 weeks ago
- ☆19May 1, 2025Updated 10 months ago
- Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)☆19Aug 23, 2024Updated last year
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Jul 23, 2024Updated last year
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆29Mar 27, 2025Updated 11 months ago
- My public CTF challenge☆17Aug 25, 2025Updated 6 months ago
- RAPID: Training-free Retrieval-based Log Anomaly Detection with PLM considering Token-level information☆18Jul 11, 2024Updated last year
- Windows Win32 Kernel Subsystem☆36Aug 23, 2025Updated 6 months ago
- Pwn CTF writeups including challenges and solutions☆18Dec 21, 2020Updated 5 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- A U-Boot hacking toolkit for security researchers and tinkerers☆35Jan 10, 2025Updated last year
- ReCopilot IDA☆50Jan 12, 2026Updated last month
- Connect your Cursor account to OpenCode and use it within OpenCode TUI!☆41Updated this week
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆23Jan 17, 2024Updated 2 years ago
- ☆21Apr 6, 2025Updated 11 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- CVE-2013-2028 python exploit☆20Jun 27, 2020Updated 5 years ago
- Code for my C2022 course☆23Nov 26, 2024Updated last year
- ☆28Jan 10, 2024Updated 2 years ago
- ☆23May 6, 2024Updated last year
- Free and open binary exploitation course for 2024 NCKUCTF☆44Oct 2, 2024Updated last year
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- ☆25Jun 25, 2021Updated 4 years ago