scvalencia / MNIST_ASCII_challengeLinks
A tiny challenge to solve by Machine Learning or Computer Hacking (or both)
☆92Updated 9 years ago
Alternatives and similar repositories for MNIST_ASCII_challenge
Users that are interested in MNIST_ASCII_challenge are comparing it to the libraries listed below
Sorting:
- ASM Malicious code - PE infector☆72Updated 8 years ago
- An exploration of code homeomorphism☆381Updated 7 years ago
- Just a simple radare2 Jupyter kernel☆110Updated 8 years ago
- Visual reverse engineering tool.☆284Updated 9 years ago
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- Run basic functions from stripped binaries cross platform☆113Updated 9 years ago
- x86 (MS-DOS) documentation, disassembler and emulator - WIP☆311Updated 9 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Updated 9 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆250Updated 9 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- Blogging about reversing "script kiddie" style malware.☆97Updated 10 years ago
- NES zombie survival game made to be hacked☆253Updated 3 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- JavaScript ROP framework☆136Updated 10 years ago
- ☆288Updated 9 years ago
- random brain dumps☆351Updated 8 years ago
- C/C++ to assembly visualizer☆383Updated 5 years ago
- Missed optimizations in C compilers☆339Updated 7 years ago
- An AIMGP (Automatic Induction of Machine code by Genetic Programming) engine☆92Updated 7 years ago
- Minimal implementation of UNIX seq command in x86_64 assembly.☆40Updated 9 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆285Updated 4 years ago
- A set of PS4 experiments using the WebKit exploit☆83Updated 9 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆697Updated 3 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- A JavaScript processor simulator to design and execute any assembly language architecture☆27Updated 8 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- Runtime and compiler for the Assembly Cup☆141Updated last year
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago