zachary12138 / TOEFL-GREView external linksLinks
托福秘籍与GRE备考心得
☆16Aug 27, 2018Updated 7 years ago
Alternatives and similar repositories for TOEFL-GRE
Users that are interested in TOEFL-GRE are comparing it to the libraries listed below
Sorting:
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Simply C program slicing tool in C☆10Jun 19, 2015Updated 10 years ago
- Toy approach to VMProtect virtualization☆16Oct 26, 2018Updated 7 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- ☆12May 6, 2020Updated 5 years ago
- afl源码分析☆13Aug 9, 2018Updated 7 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- Exploits from the Finding and Preventing Bugs in JavaScript Bindings paper☆10May 22, 2017Updated 8 years ago
- Machine learning steganographic image detection.☆15Feb 8, 2017Updated 9 years ago
- Fuzz-introspector has moved (but is actively maintained) - please follow the project here https://github.com/ossf/fuzz-introspector☆14Dec 3, 2021Updated 4 years ago
- ☆16Feb 9, 2026Updated last week
- Repo with some info about malware in IoT☆15May 31, 2018Updated 7 years ago
- The python binding for thunder download engine 迅雷开放下载引擎的python库☆13Jun 4, 2013Updated 12 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 4 months ago
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 6 years ago
- ☆16Jun 21, 2024Updated last year
- ☆13Mar 23, 2018Updated 7 years ago
- ☆12Sep 10, 2019Updated 6 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆11Dec 18, 2017Updated 8 years ago
- We try to put source files of llvm tutorials here☆18Oct 6, 2020Updated 5 years ago
- Signature based scanner that detects ad networks in Android apps.☆15Jul 23, 2014Updated 11 years ago
- My RE challenge from Northsec 2018.☆14Jun 1, 2022Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Nov 20, 2019Updated 6 years ago
- ☆17Jul 11, 2025Updated 7 months ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆26Feb 2, 2026Updated 2 weeks ago
- ☆15May 10, 2020Updated 5 years ago
- ☆19Jun 20, 2019Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Sep 4, 2018Updated 7 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 5 months ago
- llvm-essentials-book sample☆20Jan 10, 2018Updated 8 years ago
- Dynamic COFF object loader☆23Jun 29, 2018Updated 7 years ago
- Upcoming list of ctfs directly in your terminal!☆16Apr 17, 2023Updated 2 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Jan 4, 2023Updated 3 years ago
- Seminar 2022☆23Jan 10, 2026Updated last month