scvalencia / MNIST_ASCII_challengeLinks
A tiny challenge to solve by Machine Learning or Computer Hacking (or both)
☆92Updated 8 years ago
Alternatives and similar repositories for MNIST_ASCII_challenge
Users that are interested in MNIST_ASCII_challenge are comparing it to the libraries listed below
Sorting:
- The DrK Attack - Proof of concept☆345Updated 3 years ago
- An exploration of code homeomorphism☆378Updated 7 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- ASM Malicious code - PE infector☆71Updated 8 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆248Updated 8 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Updated 8 years ago
- Memory cheat tool for Windows and Linux games☆136Updated 8 years ago
- x86 (MS-DOS) documentation, disassembler and emulator - WIP☆308Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- Demo Spectre with 70 lines code☆125Updated 7 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- A small, bootable game written in x86 Assembly inspired by Space Invaders☆217Updated 5 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- The vim execution engine☆115Updated 7 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 10 years ago
- Some of my PoC stuff for the Nintendo Switch☆209Updated 8 years ago
- Ontological counterpart to whoami that explains the meaning of life.☆24Updated 7 years ago
- echo in 153 bytes (99% smaller) (x86)☆82Updated 7 years ago
- Visual reverse engineering tool.☆278Updated 8 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆288Updated 8 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆253Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- Hohha Dynamic XOR Encryption Algorithm☆54Updated 5 years ago
- Inline C/asm in Bash☆253Updated 7 years ago
- This repository contains a docker container dedicated to reverse engineering☆85Updated 6 years ago
- Kindle 5.6.5 exploitation tools.☆431Updated 7 years ago
- The "Intel x86 considered harmful" paper☆197Updated 9 years ago
- Generate "truly" random numbers (WARNING: NOT RANDOM!!! The "truly" is in sarcasquotes)☆86Updated 9 years ago