各种C51单片机的示例&课程实验(含报告)
☆18Jun 24, 2020Updated 5 years ago
Alternatives and similar repositories for C51-Example-BC
Users that are interested in C51-Example-BC are comparing it to the libraries listed below
Sorting:
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- 温室,STM32,温湿度,光照,二氧化碳浓度☆14Sep 23, 2020Updated 5 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- 让ELF以特定libc链接运行,带符号版本☆14Mar 10, 2020Updated 5 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- records of my daily sec learning☆13Mar 20, 2020Updated 5 years ago
- Prebuilt versions of V8 using GitHub Actions☆16Dec 14, 2019Updated 6 years ago
- ☆14Jul 27, 2020Updated 5 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆17Sep 2, 2018Updated 7 years ago
- ☆18Jun 2, 2021Updated 4 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Apr 3, 2021Updated 4 years ago
- 自动控制原理笔记☆34May 12, 2022Updated 3 years ago
- 一款51单片机开发平台! 包含51单片机入门教程,硬件开发板,程序代码等,所有资料开源,适合初学者入门。☆35Jul 19, 2024Updated last year
- All architecture and all version of gdbserver.☆31Sep 23, 2022Updated 3 years ago
- A fuzzing framework targeted at MQTT brokers. Modeled as a finite state machine (using Markov Modeling).☆38Jul 11, 2023Updated 2 years ago
- Summary of binary vulnerability mining techniques☆34Jan 6, 2020Updated 6 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- 电子科技大学挑战性课程《信号处理系统》(原信号与系统+数字信号处理)课程课程设计☆40Sep 20, 2018Updated 7 years ago
- Intel x86_64 assembly language and pwntools dash docset☆39Apr 12, 2023Updated 2 years ago
- Plugin For BurpSuite (Pentester)☆37Nov 22, 2022Updated 3 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆36Nov 21, 2020Updated 5 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- ctf patching toy☆49Nov 18, 2024Updated last year
- WIP iOS 11 - 12.2 & 13b1,b2 Safari Jailbreak☆43Sep 15, 2020Updated 5 years ago
- 2022考研政治笔记☆48Dec 5, 2021Updated 4 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- ☆55Apr 24, 2020Updated 5 years ago
- qemu vulnerablity.☆55May 25, 2021Updated 4 years ago
- z3 solver 学习☆53Jun 17, 2023Updated 2 years ago
- CommonsBeanutils1,CommonsCollectionsK1☆58Nov 16, 2020Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- 2020西湖论剑IOT闯关赛赛后开放资源☆57Nov 25, 2020Updated 5 years ago
- research and survey papers related to IoT security from 2014 to the first half of 2019☆60Jun 14, 2020Updated 5 years ago
- Sleep_Pwn_f1sh☆59Apr 22, 2018Updated 7 years ago
- Exploitation challenges for CTF☆63Feb 13, 2018Updated 8 years ago
- 2021西湖论剑IoT、虚实结合赛后开放资源☆66Mar 18, 2022Updated 3 years ago