Virtual Home Directory
☆14May 9, 2017Updated 8 years ago
Alternatives and similar repositories for ch
Users that are interested in ch are comparing it to the libraries listed below
Sorting:
- valgrind fork with mmap tracing support☆24Jun 22, 2020Updated 5 years ago
- A training course for BambooFox☆25Mar 18, 2016Updated 9 years ago
- Through a simple way to deal with the event flow.☆110Jan 6, 2023Updated 3 years ago
- a image process component for react☆76Dec 8, 2022Updated 3 years ago
- The Graduate Thesis Template in NTUST 國立台灣科技大學的論文 LaTeX 範本☆35Jul 30, 2022Updated 3 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- 基于ASP.NET的流媒体视频点播网站☆11Mar 6, 2017Updated 8 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Very simple and stupid TCP/IP stack written in C☆10Mar 25, 2016Updated 9 years ago
- 注音輸入方案☆48Jan 6, 2026Updated last month
- ☆12Apr 1, 2025Updated 10 months ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- ☆21Feb 10, 2026Updated 2 weeks ago
- KiCAD Design files for the India Navi device☆10Oct 28, 2021Updated 4 years ago
- SITCON 2019 Official Website☆10Oct 6, 2019Updated 6 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- ☆10Dec 26, 2023Updated 2 years ago
- fcitx chewing wrapper☆10Nov 20, 2022Updated 3 years ago
- vSphere metrics plugin for collectd☆11Feb 12, 2019Updated 7 years ago
- ☆14Apr 24, 2024Updated last year
- btree written in c☆10Feb 26, 2015Updated 11 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago
- Jasmine "lnishan" Chen's Curriculum Vitae (CV) in Markdown☆10May 23, 2018Updated 7 years ago
- Anyboard开源掌机的电路图和结构图☆13Oct 12, 2020Updated 5 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- Angel - a symmetrical staggered ergonomic keyboard.☆12Jan 27, 2021Updated 5 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- linear probing hash table implementation written in C (c99)☆10Jul 8, 2018Updated 7 years ago
- ☆11Apr 27, 2020Updated 5 years ago
- PoW of Nano Cryptocurrency using GPU (OpenCL) and CPU using Golang☆13Dec 18, 2023Updated 2 years ago