☆11Jul 26, 2022Updated 3 years ago
Alternatives and similar repositories for pku_exploit_files
Users that are interested in pku_exploit_files are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 3 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆28Aug 10, 2020Updated 5 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆10May 12, 2023Updated 2 years ago
- walu-lib, a library for me.☆28Apr 15, 2014Updated 11 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆23Nov 16, 2023Updated 2 years ago
- OASIS OpenC2 TC: GitHub repository used to propose and track changes to the OpenC2 Language Specification as new working draft level revi…☆17May 9, 2024Updated last year
- ☆14Dec 30, 2021Updated 4 years ago
- 一个可扩展的智能合约安全审计工具☆13Oct 13, 2020Updated 5 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- like ROP Defender☆10May 6, 2015Updated 10 years ago
- A simple SSL/TLS proxy using libevent.☆14May 21, 2017Updated 8 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- practice-toy-wasm-vm-go☆11Apr 20, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- Multi-version glibc source browser based on code.woboq.org 's product.☆10Feb 27, 2020Updated 6 years ago
- Protect your docker container from the public internet☆12Sep 5, 2017Updated 8 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Static Web page hosting☆15Feb 14, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A demo about how to build a real compiler with LLVM libraries, write for the book https://github.com/tuoxie007/play_with_llvm☆10Apr 11, 2020Updated 5 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- ☆25Jun 2, 2024Updated last year
- ☆10Apr 8, 2022Updated 3 years ago
- Rootkit。 进程监控。☆11Jul 19, 2016Updated 9 years ago
- ☆13Jan 12, 2018Updated 8 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Apr 20, 2022Updated 3 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SUPA☆28Jan 15, 2026Updated 2 months ago
- ☆19Dec 1, 2024Updated last year
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 6 months ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆12Jan 24, 2019Updated 7 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- eBPF C programs injectable in a network card to extract packets' features for detecting different network attacks.☆14May 6, 2022Updated 3 years ago