CTF participations
-
Updated
Mar 28, 2020 - C
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
CTF participations
This Repository contains my solution for Exploit Exercises Nebula wargame. Journey of being a hacker.
Basic demonstration of a stack buffer overflow
Check Point Security Academy Challenges 2019
HikVision Vulnerability quick check
A simple port scanner (with option to print to file) written in C using GTK 3.0
Capture the flag challenges for exploiting application vulnerabilities
Bankrupt Covert Channel [Ustiugov et al., WOOT at USENIX Sec'20]
(MobiSys-24 Poster) BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
PoCs of security issues that I've reported
Variuos buffer overflow attack and countermeasures examples
Result of the Android security research
Contains Attack labs
mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Oct 29 - 30, 2024 • San Francisco, CA