The program does not involve convoluted logic. just make use of if else branching by followed windows scripting commands to hide a folder
-
Updated
May 8, 2024 - C
The program does not involve convoluted logic. just make use of if else branching by followed windows scripting commands to hide a folder
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Scripts used for the Software systems exploitation course
Microarchitectural store buffer data sampling attack's implementation
Implements a cache-timing side-channel attack and an accompanying defense making use of correlation between victim and spy processes.
C Implementation of Quantum Simplified-DES
Program to check strength of your passwod along with total combinations, summary and with comments.
Attaque informatique par un dépassement de tampon dans lequel l'adresse de retour dans la pile est remplacée par l'adresse d'une autre fonction et une seconde partie de la pile est modifiée pour fournir les paramètres à cette fonction.
For one of the CENG489 homeworks
Bruteforce library that allows you to implement bruteforce in any application at ease.
Coingecko & Agent Ftpupload create beautiful crypto wallet addresses, but keep the private key safe
Cryptocurrency of Bitcoin against QIANSHI quantum computer from Chinese search engine giant Baidu Inc.
This is Script tools from all attack Denial of service by C programming
SideLine is a novel power side-channel vector based on delay-line components widely implemented in high-end SoC.
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."