-
Our CloudKit [protobuf definitions](https://github.com/horrorho/InflatableDonkey/blob/master/src/main/resources/cloud_kit.proto) work well but are now quite ancient. There is a newer [partial dump](ht…
-
Could you please give me some advice ? How can I get the cpu usage meminfo by entending you code? Is there any route or infos ? Thanks a lot!
-
Thank you for awesome tool!
[Radare2](https://github.com/radareorg/radare2) is a highly-portable cross-platform reverse engineering framework and a toolkit without dependencies. It has support for…
-
Hello Exyte team,
first of all I want to thank you all for this marvelous framework.
I'm developing a 2D CAD application for iPad and I decided to base it on Macaw.
Of course it seems Macaw have no…
-
### Description of the new feature / enhancement
A new PowerToy to see which programs are using each network port. Equivalent to File Locksmith but for networking.
It should show the following ite…
-
Edit: see https://github.com/worawit/blutter/pull/17. Realized that's it's better to also have things output to json than hard coding support for a tool inside the program.
Radare is a terminal b…
-
Hi! I've been referenced to this repo by someone stating that synth2 would be aiming for patch compatibility with Ichiro Toda - Synth1's. Effectively making this synthesizer a Synth1 clone of sorts.
…
-
The is a meta issue which collects interesting references for future research.
# Links
- https://github.com/REMath/literature_review
- https://retdec.com/publications/
- http://www.program-tra…
-
I'm wondering if it's possible to interact somehow with AVRoutePickerView presented view.
I'm referring to the view presented when you select an airplay button, you can check an example here:
http…
-
[Ghidra](https://www.nsa.gov/resources/everyone/ghidra/)
[GitHub page](https://github.com/NationalSecurityAgency/ghidra)
Ghidra is a software reverse engineering (SRE) framework developed by NSA's…