Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
-
Updated
Jan 10, 2018 - C
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
Contains Attack labs
Result of the Android security research
PoCs of security issues that I've reported
Variuos buffer overflow attack and countermeasures examples
(MobiSys-24 Poster) BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
Bankrupt Covert Channel [Ustiugov et al., WOOT at USENIX Sec'20]
A simple port scanner (with option to print to file) written in C using GTK 3.0
Capture the flag challenges for exploiting application vulnerabilities
Basic demonstration of a stack buffer overflow
This Repository contains my solution for Exploit Exercises Nebula wargame. Journey of being a hacker.
CTF participations
Check Point Security Academy Challenges 2019
HikVision Vulnerability quick check