syang-ng / cybercrime-papersView external linksLinks
Recent academic papers related to cybercrime
☆17Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for cybercrime-papers
Users that are interested in cybercrime-papers are comparing it to the libraries listed below
Sorting:
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Dec 19, 2019Updated 6 years ago
- ☆32Aug 16, 2020Updated 5 years ago
- ☆41Jul 6, 2022Updated 3 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆32Feb 28, 2020Updated 5 years ago
- Solutions to Programming Challenges. (Literate Programs.)☆14Jun 22, 2025Updated 7 months ago
- Competitive & Interview Coding questions and solutions.☆10Aug 3, 2021Updated 4 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- ☆11Apr 11, 2022Updated 3 years ago
- ☆19Jun 24, 2023Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- A nicer look at my GitHub profile and repository stats with data visualizations of my top languages and stars. Sort through your top repo…☆13Jun 19, 2022Updated 3 years ago
- A simple flashable zip to switch between LineageOS and Sailfish OS boots☆11Dec 7, 2020Updated 5 years ago
- Research into creating tiny .NET executables☆14Apr 21, 2018Updated 7 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- Coding interview challenges☆10Jan 11, 2022Updated 4 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- Yara sort☆13Updated this week
- ☆10Mar 27, 2025Updated 10 months ago
- Логотипы различных дистрибутивов GNU/Linux. Список будет пополняться☆10Mar 17, 2023Updated 2 years ago
- Welcome to ChillWeather.☆10Aug 4, 2022Updated 3 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Jan 29, 2018Updated 8 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆15Apr 5, 2017Updated 8 years ago
- A reading group for system verification papers☆10Sep 28, 2023Updated 2 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago
- LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing☆23Jun 30, 2025Updated 7 months ago
- Keep Magisk installed after OTA under addon.d supported ROMs☆43Jun 8, 2023Updated 2 years ago
- Speak to your shell using various metaphors sourced from differing cultural dialects.☆14Jan 14, 2021Updated 5 years ago
- "For all the accomplishments of molecular biology, we still can't tell a live cat from a dead cat." ― Lynn Margulis☆13Jul 25, 2019Updated 6 years ago
- Opriver's Quant Quest☆11Aug 27, 2018Updated 7 years ago
- A simple tool to do linux emergency check☆11Mar 16, 2020Updated 5 years ago
- Captain Claw external hack☆21May 18, 2022Updated 3 years ago
- ☆12Feb 18, 2021Updated 4 years ago
- Nethunter Kernel for the OnePlus 3 / 3T - Ten☆12May 9, 2023Updated 2 years ago
- D-Link DCS-8600LH usage info tools☆12Jan 17, 2020Updated 6 years ago
- ☆11Nov 12, 2020Updated 5 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago