将源码工程文件批量转到一个pdf中,并自动生成文件标签以便跳转。
☆24Sep 13, 2015Updated 10 years ago
Alternatives and similar repositories for batch2pdf
Users that are interested in batch2pdf are comparing it to the libraries listed below
Sorting:
- This script checks visa application status using idata.com.tr services in Turkey (for Germany and Italy) and notifies OSX Notification Ce…☆11Jul 9, 2015Updated 10 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- libRunTimeStruct: Create C structs at runtime☆13Dec 8, 2015Updated 10 years ago
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- A simple interpreter☆19Nov 13, 2018Updated 7 years ago
- ePump是一个基于I/O事件通知、非阻塞通信、多路复用、多线程等机制开发的事件驱动模型的 C 语言应用开发框架,利用该框架可以很容易地开发出高性能、大并发连接的服务器程序。☆45Sep 27, 2024Updated last year
- Combinators in C☆38Jun 5, 2012Updated 13 years ago
- Some C macros (and associated code generators) to count and iterate over variadic macro arguments☆10Jun 24, 2022Updated 3 years ago
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- dexposed原理学习☆10Sep 1, 2015Updated 10 years ago
- Generally useful macros for C/C++ programming☆12Jun 29, 2024Updated last year
- ☆10Feb 9, 2015Updated 11 years ago
- Unpacks java-to-exe files converted by JWrapper☆12Dec 5, 2022Updated 3 years ago
- A small tool for embedding files in a Go source file.☆11Nov 3, 2020Updated 5 years ago
- Lightweight async functions implementation in C, using multithreading☆12Jun 17, 2025Updated 8 months ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- The lecture notes and programs for my class on real analysis. This is very much work in progress!☆12Sep 19, 2021Updated 4 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Hackme is a network security answer platform,Hackme网络安全答题平台☆10Nov 5, 2015Updated 10 years ago
- Indexed Array is a C library struct array for you to add index into struct field member in order to do faster search☆12Mar 7, 2018Updated 7 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Bytekit is a PHP extension that provides a userspace representation of the opcodes generated by the Zend engine compiler built into PHP.☆19May 21, 2011Updated 14 years ago
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆18Apr 5, 2013Updated 12 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- PSoC 4 BLE design example repository☆11May 3, 2017Updated 8 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Proof that I did all the exercises from: https://ruslanspivak.com/lsbasi-part1/☆12Feb 10, 2022Updated 4 years ago
- Last Writer Slicing: data provenance tracking for concurrent program debugging & analysis☆13Nov 14, 2014Updated 11 years ago
- ☆11Aug 22, 2022Updated 3 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Oct 12, 2017Updated 8 years ago
- Skeleton project for your own GRUB-based bootkit☆17Jan 11, 2020Updated 6 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago