汉化加补充自己的理解
☆33Dec 6, 2020Updated 5 years ago
Alternatives and similar repositories for how2heap_zh
Users that are interested in how2heap_zh are comparing it to the libraries listed below
Sorting:
- 一个轻量级的CTF题目展示平台。支持对flag的验证,易于部署(甚至无需服务器,在Git上即可完成部署)。☆11Nov 7, 2024Updated last year
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 10 months ago
- ☆14Mar 11, 2025Updated 11 months ago
- 学习滴水逆向时,所写的一些PE相关的代码☆17Apr 27, 2022Updated 3 years ago
- Templates for deploying pwn challenge in ctf☆51Mar 24, 2023Updated 2 years ago
- All of my writeups will be here.☆26Oct 14, 2025Updated 4 months ago
- A customized debug tool☆21Nov 20, 2024Updated last year
- Backdoor&后渗透工具☆21Aug 10, 2021Updated 4 years ago
- 自动检测ctf中的图片隐写☆36Apr 22, 2023Updated 2 years ago
- A multithread tool to scan for available APs and display their Signal Strength, Security Protocol, SSID and channels. Written in Python (…☆12Jul 6, 2021Updated 4 years ago
- Receive and decode TST-507 TPMS signals☆10Feb 5, 2022Updated 4 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- 【python】利用百度语音识别API,百度语音合成API,图灵机器人API实现简单的对话机器人☆10Mar 13, 2021Updated 4 years ago
- Move Vulnerability Database☆19Nov 18, 2025Updated 3 months ago
- kubernetes resources recommend☆23Aug 18, 2025Updated 6 months ago
- This command can be run to watch a cgroup for OOM events and run some subcommand.☆14Dec 11, 2014Updated 11 years ago
- ☆12Mar 13, 2025Updated 11 months ago
- ☆27Jun 17, 2025Updated 8 months ago
- Read and write Windows process memory. A fork of memoryjs.☆10Oct 27, 2025Updated 4 months ago
- JS运行时Just0.1.4源码分析☆15Aug 26, 2021Updated 4 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- A generic raft library☆12Jan 23, 2026Updated last month
- 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆12Dec 18, 2023Updated 2 years ago
- ☆11Nov 7, 2019Updated 6 years ago
- AWD 自动化攻击框架☆10Jun 21, 2019Updated 6 years ago
- 分布式、高可用的延迟调度系统、可以配合消息队列实现延迟任务队列☆12Dec 5, 2023Updated 2 years ago
- RetinaNet face detection model inference on edge/mobile device utilizing MNN framework.☆13Feb 27, 2023Updated 3 years ago
- Docker file for pwn env. (ubuntu16.04/18.04/18.10)☆10Aug 19, 2021Updated 4 years ago
- 当今海量的移动应用跟人们的生活、工作、学习、休闲、娱乐等方面密切相关,发挥着重要作用。多数APP在安装、更新时,都会向用户申请相关手机权限。多数终端用户缺乏鉴别APP所请求的权限是否合理的能力,并且APP安装使用过程中过度索要权限现象较为普遍,这就给用户数据安全、隐私信息泄…☆13Feb 11, 2020Updated 6 years ago
- ☆15Sep 4, 2020Updated 5 years ago
- krew-wasm offers a way to write and distribute kubectl plugins based on WebAssembly☆14Apr 15, 2024Updated last year
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- Reflective memory for AI agents☆22Updated this week
- ☆25Sep 17, 2025Updated 5 months ago
- A CPU Backdoor. Phrack 72☆15Dec 4, 2025Updated 3 months ago
- ☆11Nov 25, 2020Updated 5 years ago
- 用于自动化检测CTF中常出现得工具图片隐写题目☆10Feb 6, 2021Updated 5 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago