jslhs's repositories
big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
BorderlessWindow
basic win32 example of a borderless window (with aero shadows)
darwin-xnu
The Darwin Kernel (mirror)
deep-image-prior
Image restoration with neural networks but without learning.
docker-ikev2-vpn-server
IKEv2 VPN Server on Docker, with .mobileconfig for OS X 10.11 El Capitan / iOS 9 / iOS 8.
fcn.berkeleyvision.org
Fully Convolutional Networks for Semantic Segmentation by Jonathan Long*, Evan Shelhamer*, and Trevor Darrell. CVPR 2015 and PAMI 2016.
herebedragons
A basic 3D scene implemented with various engines, frameworks or APIs.
modern-js-cheatsheet
Cheatsheet for the JavaScript knowledge you will frequently encounter in modern projects.
neural-painter
Paint artistic patterns using random neural network
papers-we-love
Papers from the computer science community to read and discuss.
poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
recompiler
Xbox360 -> Windows executable converter
rtl8812au_rtl8821au
rtl8812au & rtl8821au driver (primarily) for Arch Linux
setup-ipsec-vpn
Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
Triton
Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations of the x86 and the x86-64 instructions set semantics, SMT simplification passes, an SMT Solver Interface and, the last but not least, Python bindings.
WeChatRedEnvelop
iOS版微信抢红包Tweak
wifi-cracking
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat 🖧