Pinned Repositories
bilibili
CVE-2018-4878
CVE-2018-4879
Aggressor Script to launch IE driveby for CVE-2018-4878
files
how2heap
Micro8
Gitbook
pwn
s2e-old
This is the archived S2E 1.0 repo. Please check out S2E 2.0 on https://github.com/s2e
shadowsocks-source-analysis
shadowsocks早期源码分析
sqli-labs
SQLI labs to test error based, Blind boolean based, Time based.
Yable's Repositories
Yable/bilibili
Yable/CVE-2018-4878
Yable/CVE-2018-4879
Aggressor Script to launch IE driveby for CVE-2018-4878
Yable/files
Yable/how2heap
Yable/Micro8
Gitbook
Yable/pwn
Yable/s2e-old
This is the archived S2E 1.0 repo. Please check out S2E 2.0 on https://github.com/s2e
Yable/shadowsocks-source-analysis
shadowsocks早期源码分析
Yable/sqli-labs
SQLI labs to test error based, Blind boolean based, Time based.
Yable/go-common
B站源码
Yable/openbilibili-go-common
嘘,不要问!我也不清楚这些是啥…
Yable/Terminal
The new Windows Terminal, and the original Windows console host -- all in the same place!
Yable/USBCopyer
😉 用于在插上U盘后自动按需复制该U盘的文件。”备份&偷U盘文件的神器”(写作USBCopyer,读作USBCopier)