nickname_english | weixin_no | url | title |
---|
github_id | title | url | org_url | org_profile | org_geo | org_repositories | org_people | org_projects | repo_lang | repo_star | repo_forks |
---|---|---|---|---|---|---|---|---|---|---|---|
microsoft | 微软开源 Windows 10 使用的 Windows Subsystem for Linux 2 (WSL2) 版本 Linux 内核的源码 | https://github.com/microsoft/WSL2-Linux-Kernel | https://opensource.microsoft.com | Open source, from Microsoft with love | Redmond, WA | 0 | 0 | 0 | TypeScript,Java,C#,JavaScript,C++,Python,HTML,CSS,Rich,Go,Jupyter,PowerShell,HCL | 79000 | 11000 |
github_id | title | url | p_url | p_profile | p_loc | p_company | p_repositories | p_projects | p_stars | p_followers | p_following | repo_lang | repo_star | repo_forks |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
maddiestone | 谷歌安全团队成员在Recon 2019会议上分享的Android病毒逆向分析,病毒通过各种反射和混淆隐藏自身真实payload,但通过仔细逆向,仍然能够将其分析清楚,毕竟Java编译之后的代码语义的留存还是挺多的 | https://github.com/maddiestone/ConPresentations/blob/master/REcon2019.PathToThePayload.pdf | http://twitter.com/maddiestone | None | None | 3 | 0 | 2 | 160 | 1 | Python | 436 | 91 | |
blaCCkHatHacEEkr | 渗透测试、红队攻击、网络安全资源大集合 | https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE | https://twitter.com/cry__pto | MalwareHacker | OSPentester | NetworkBreaker | ForensicsExpert | SocialEngineeringPro | WebProtector |
python update_daily.py