Skip to content
View rogxo's full-sized avatar
  • Reverse Engineering Co. Ltd.
  • Metaverse
  • 03:32 (UTC +08:00)

Organizations

@ClassicalMusicClub

Block or report rogxo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
rogxo/README.md

Using

"C","C++","Java","Asm","Python","Go"

Anyway constexpr is the magic of cplusplus.

Stats

Visitors

💻 Environment

Windows Ubuntu Kali

Pinned Loading

  1. kernel_hack kernel_hack Public

    安卓内存读写驱动 linux kernel (Android) memory tool

    C 133 50

  2. ReadPhys ReadPhys Public

    r/w virtual memory without attach

    C++ 146 56

  3. search search Public

    A series of methods used to detect kernel shellcode for tencent game safe race 2024

    C 30 14