(MobiSys-24 Poster) BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
-
Updated
May 26, 2024 - C
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
(MobiSys-24 Poster) BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
Capture the flag challenges for exploiting application vulnerabilities
Bankrupt Covert Channel [Ustiugov et al., WOOT at USENIX Sec'20]
A simple port scanner (with option to print to file) written in C using GTK 3.0
mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
CTF participations
HikVision Vulnerability quick check
Check Point Security Academy Challenges 2019
PoCs of security issues that I've reported
This Repository contains my solution for Exploit Exercises Nebula wargame. Journey of being a hacker.
Contains Attack labs
Basic demonstration of a stack buffer overflow
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Result of the Android security research
Variuos buffer overflow attack and countermeasures examples
Oct 29 - 30, 2024 • San Francisco, CA