Pinned Repositories
Ali-loner.github.io
Ali-loner的个人主页
alloystar
Unofficial copy of the Alloy* tool's source code (http://alloy.mit.edu/alloy/hola/)
awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
caj2pdf
Convert CAJ (China Academic Journals) files to PDF. 转换**知网 CAJ 格式文献为 PDF。佛系转换,成功与否,皆是玄学。
capstone
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
lib-tdt
Speculative-Code-Store-Bypass-POC
Speculative Code Store Bypass Vulnerability Proof-of-Concept
JUSDJTIN's Repositories
JUSDJTIN/Speculative-Code-Store-Bypass-POC
Speculative Code Store Bypass Vulnerability Proof-of-Concept
JUSDJTIN/Ali-loner.github.io
Ali-loner的个人主页
JUSDJTIN/caj2pdf
Convert CAJ (China Academic Journals) files to PDF. 转换**知网 CAJ 格式文献为 PDF。佛系转换,成功与否,皆是玄学。
JUSDJTIN/capstone
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
JUSDJTIN/chisel3
Chisel 3
JUSDJTIN/conti-leaks-englished
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
JUSDJTIN/cpplinks
A categorized list of C++ resources.
JUSDJTIN/difuzz-rtl
JUSDJTIN/frap
Formal Reasoning About Programs
JUSDJTIN/hardware-attacks-state-of-the-art
Microarchitectural exploitation and other hardware attacks.
JUSDJTIN/hosts-ipv6
镜像 https://coding.net/u/scaffrey/p/hosts-ipv6/git
JUSDJTIN/IDA7.0
IDA7.0 Freeware for Windows,Linux and Mac
JUSDJTIN/Introduce_to_virtualization
500篇关于虚拟化的经典资料,含CPU虚拟化,磁盘虚拟化,内存虚拟化,io虚拟化。
JUSDJTIN/Lihang
Statistical learning methods, 统计学习方法(第2版)[李航] [笔记, 代码, notebook, 参考文献, Errata, lihang]
JUSDJTIN/MachineLearning
Basic Machine Learning and Deep Learning
JUSDJTIN/mlpack
mlpack: a scalable C++ machine learning library --
JUSDJTIN/Neural-Networks-on-Silicon
This is a collection of works on neural networks and neural accelerators.
JUSDJTIN/openbilibili
JUSDJTIN/Pandora
Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data
JUSDJTIN/riscv-boom
SonicBOOM: The Berkeley Out-of-Order Machine
JUSDJTIN/riscv-boom-UPEC
UPEC is a formal approach for detecting vulnerabilities to transient execution attacks in out-of-order processors
JUSDJTIN/riscv-cores-list
RISC-V Cores, SoC platforms and SoCs
JUSDJTIN/riscv-gnu-toolchain
GNU toolchain for RISC-V, including GCC
JUSDJTIN/rocket-chip
Rocket Chip Generator
JUSDJTIN/SpeechMiner
JUSDJTIN/TransForm
Formal specification of transistency models and automated synthesis of enhanced litmus test suites
JUSDJTIN/upec-boom-verification-suite
This repository contains the verification suite for verifying Berkeley Out-of-Order Machine (BOOM) against transient execution attacks based on the Unique Program Execution Checking (UPEC) approach.
JUSDJTIN/vega-lite
Software, tools, and documentation for RV32-VEGA-Lite platform
JUSDJTIN/vmware-tools-patches
Patch and build VMware tools automatically
JUSDJTIN/XiangShan
Open-source high-performance RISC-V processor