System Programming
☆11Nov 9, 2018Updated 7 years ago
Alternatives and similar repositories for lecture_sysprog
Users that are interested in lecture_sysprog are comparing it to the libraries listed below
Sorting:
- Osori Contributors☆11May 22, 2018Updated 7 years ago
- Osori's private room checking system☆12Sep 8, 2018Updated 7 years ago
- Battle.ai AI battle Framework☆14Sep 10, 2017Updated 8 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- C++ network library☆10Apr 14, 2015Updated 10 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- 웹 크롤링 기반 Push 서비스☆10Sep 19, 2016Updated 9 years ago
- Gandr is a cross-platform bootloader project, intended to fill in the gap of a utopic bootloader.☆20Aug 13, 2015Updated 10 years ago
- Smart contracts for a home rental network with IoT doorlocks☆11Jun 5, 2018Updated 7 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- extremely simple MTA to get mail off the system to a mail hub☆14Oct 31, 2013Updated 12 years ago
- Haskell book exercises - http://haskellbook.com/☆11Dec 26, 2018Updated 7 years ago
- The kernel for the Wink Hub☆11Oct 29, 2014Updated 11 years ago
- ECE 264 Advanced C Programming☆17Apr 10, 2019Updated 6 years ago
- Keras implementation of DnCNN-S. Originaly as proposed by Zhang et al in the paper Beyond a Gaussian Denoiser: Residual Learning of Deep…☆10May 18, 2018Updated 7 years ago
- Continuum Dynamics Evaluation and Test Suite☆15Aug 29, 2017Updated 8 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- ☆11Dec 3, 2014Updated 11 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Debian packages for Kyoto Cabinet, a fast database library☆17Mar 8, 2011Updated 14 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆28Nov 10, 2025Updated 3 months ago
- A Python-based security assessment tool for continuous automated security scanning and monitoring of domains.☆13Apr 4, 2025Updated 10 months ago
- Study Guide for COS 418☆11May 24, 2017Updated 8 years ago
- PoC code for CVE-2019-14041☆13Apr 15, 2020Updated 5 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, O…☆11Jul 3, 2018Updated 7 years ago
- Amarisoft LTE - 4G Selective Jammer Core☆13Nov 24, 2019Updated 6 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- rocketmq source code comments☆10Jun 29, 2022Updated 3 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Multum In Parvo Operating System is a cooperative multitasking RTOS designed for single-chip micro-controllers with severely limited RAM …☆11Jun 3, 2024Updated last year
- A distributed filesystem☆10Jan 31, 2017Updated 9 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- The Redis protocol on top of LevelDB, written in Go (WIP)☆58Jan 4, 2014Updated 12 years ago