Pinned Repositories
8bitcpu
a_cpu_backdoor
axi_sram_bridge
cpu7
cpu7b
hypervisor_for_rootkit
soc1
soc2
tinyemulator
Run-time x64 instruction emulator. Run(emulate) a piece of code in the current process context. Any memory writes will be discarded and be reported. Useful for disassemble a small piece of code at run-time.
whensungoesdown.github.io
whensungoesdown's Repositories
whensungoesdown/a_cpu_backdoor
whensungoesdown/axi_sram_bridge
whensungoesdown/8bitcpu
whensungoesdown/cpu7
whensungoesdown/hypervisor_for_rootkit
whensungoesdown/tinyemulator
Run-time x64 instruction emulator. Run(emulate) a piece of code in the current process context. Any memory writes will be discarded and be reported. Useful for disassemble a small piece of code at run-time.
whensungoesdown/whensungoesdown.github.io
whensungoesdown/ascii_dinosaur
whensungoesdown/asst3
whensungoesdown/at45db021_teensy32
whensungoesdown/cpu7b
whensungoesdown/maemu
whensungoesdown/soc1
whensungoesdown/soc1_bootloader
bootloader C code for soc1 project
whensungoesdown/soc2
whensungoesdown/bcm43455dumprom
whensungoesdown/ca_course_report
whensungoesdown/cpu4
whensungoesdown/cpu5
whensungoesdown/cpu6
whensungoesdown/Deep-Compression-PyTorch
PyTorch implementation of 'Deep Compression: Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman Coding' by Song Han, Huizi Mao, William J. Dally
whensungoesdown/ktoctou
whensungoesdown/la32r-linux
whensungoesdown/osdesignasst
whensungoesdown/simu_otprom_cell_logic
Right after reset, agent reads out otprom word and stored in register, then use it as signals. The otprom is simulated with a sram
whensungoesdown/soc1prj_template
whensungoesdown/spaceinvaders
whensungoesdown/teensy_jtag
whensungoesdown/testpy
whensungoesdown/windows-syscall-table
windows syscall table from xp ~ 10 rs4