sondt1337 / Caro-Game-Project
Sản phẩm "Cờ Caro cổ điển" - Project 1
☆1Updated last year
Alternatives and similar repositories for Caro-Game-Project:
Users that are interested in Caro-Game-Project are comparing it to the libraries listed below
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆17Updated 11 months ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆14Updated 4 months ago
- Các ví dụ và tài liệu tham khảo☆9Updated last year
- Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố☆12Updated last year
- Codebase for challenges in VHC_CTF_2023☆20Updated last year
- ☆10Updated last year
- ☆4Updated 4 months ago
- ☆2Updated last year
- Simple portforwarder for monitor traffic, detect patterns and replace response.☆23Updated 2 years ago
- National Graduation Exam Score from 2022 to 2024☆11Updated 7 months ago
- Learning Assembly☆14Updated 2 years ago
- Awesome BLOG for tech-er☆13Updated 3 weeks ago
- ☆11Updated last year
- Bounty Boys: OWASP Top 10 Series☆26Updated 3 months ago
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆15Updated last month
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆204Updated 4 months ago
- Reflective DLL Injection Made Bella☆218Updated last month
- A reverse shell for Windows and Linux written in C.☆68Updated 2 years ago
- 🇻🇳 [VNCERT/CC] Digital Forensics Lab 🇻🇳☆19Updated 2 months ago
- Red Team Operator - Resource☆28Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆246Updated 10 months ago
- repository for kscs-ctfs☆8Updated 2 years ago
- ☆250Updated last year
- Collection of my volatility3 plugins☆17Updated 5 months ago
- Bypassing antivirus detection: old-school malware, new tricks☆57Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆274Updated 9 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆241Updated 3 months ago
- My Leetcode Problems' Solutions☆11Updated last year
- ☆177Updated last year
- Proof of concept code for thread pool based process injection in Windows.☆115Updated 3 months ago