Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
-
Updated
Jan 10, 2018 - C
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Contains Attack labs
mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
Result of the Android security research
HikVision Vulnerability quick check
Variuos buffer overflow attack and countermeasures examples
(MobiSys-24 Poster) BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
CTF participations
This Repository contains my solution for Exploit Exercises Nebula wargame. Journey of being a hacker.
Bankrupt Covert Channel [Ustiugov et al., WOOT at USENIX Sec'20]
Basic demonstration of a stack buffer overflow
PoCs of security issues that I've reported
Check Point Security Academy Challenges 2019
A simple port scanner (with option to print to file) written in C using GTK 3.0
Capture the flag challenges for exploiting application vulnerabilities
Oct 29 - 30, 2024 • San Francisco, CA