Compiler exploits and exploitable non-obvious source code back doors.
-
Updated
Sep 5, 2016 - C++
Compiler exploits and exploitable non-obvious source code back doors.
The source code of our attacking tool described in the paper "Breaking and Fixing Gridcoin" published at WOOT'17, see also:
Implementation of all the basic Cryptogaphy algorithms and detailed procedure of Attacks.
Code to Demonstrate Buffer Overflow Vulnerability in Simple Authentication Apps
Evaluation of SVM and KNN in Website Fingerprinting Attack
Some projects written by me at the University. :) http://tu-plovdiv.bg
[NTUA-ECE] Assignment for "Programming Techinques" at National Technical University of Athens department of Electrical and Computer Engineering (2016).
Bypass UAC by abusing the Internet Explorer Add-on installer
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing shell protocol handlers
Bypass UAC by hijacking a DLL located in the Native Image Cache
Proof-of-Concept of the Frontal Attack
Kicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."