-
Updated
Dec 27, 2022 - C
security-vulnerability
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 18 public repositories matching this topic...
CTF participations
-
Updated
Mar 28, 2020 - C
This Repository contains my solution for Exploit Exercises Nebula wargame. Journey of being a hacker.
-
Updated
Jun 5, 2019 - C
Bankrupt Covert Channel [Ustiugov et al., WOOT at USENIX Sec'20]
-
Updated
Apr 25, 2021 - C
(MobiSys-24 Poster) BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
-
Updated
May 26, 2024 - C
Basic demonstration of a stack buffer overflow
-
Updated
Mar 4, 2018 - C
PoCs of security issues that I've reported
-
Updated
Sep 10, 2019 - C
Check Point Security Academy Challenges 2019
-
Updated
Oct 3, 2019 - C
A simple port scanner (with option to print to file) written in C using GTK 3.0
-
Updated
Nov 13, 2020 - C
Capture the flag challenges for exploiting application vulnerabilities
-
Updated
Nov 12, 2021 - C
-
Updated
Mar 1, 2019 - C
HikVision Vulnerability quick check
-
Updated
Nov 22, 2019 - C
Variuos buffer overflow attack and countermeasures examples
-
Updated
Jul 11, 2016 - C
Result of the Android security research
-
Updated
Feb 16, 2017 - C
mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
-
Updated
Oct 20, 2020 - C
Contains Attack labs
-
Updated
Jan 31, 2019 - C
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
-
Updated
Jan 10, 2018 - C
- Followers
- 36.5k followers
- Wikipedia
- Wikipedia
GitHub Universe 2024
Oct 29 - 30, 2024 • San Francisco, CA