🔐 Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator
-
Updated
Jan 14, 2018 - C++
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
🔐 Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator
Fuzz testing framework for network protocols.
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Spectre attack variant 1 is used here to extract an image data buffer from a program. The output image data is then decoded and median filters are applied to remove the hot pixels in the output image. Here I have included files for RGB and base64 format.
Trabalho final sobre falhas de códigos em C para OSRC0001.
Light course on "Function Hooking" for my Software Security module. Powerpoint + demo included
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
MOC3ingbird Exploit for Live2D (CVE-2023-27566)
This project presents an algorithm to assess the impact of a breach in a Virtual Machine (VM) network, ranking infected VMs by severity based on their connection types (Peer-to-peer > TCP > UDP > ICMP). It aids security administrators in prioritizing their response to contain and mitigate the breach's effects.
Oct 29 - 30, 2024 • San Francisco, CA