Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
-
Updated
Oct 17, 2024 - C++
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Detect deauthentication frames using an ESP8266
Bypass UAC by hijacking a DLL located in the Native Image Cache
Bypass UAC by abusing the Internet Explorer Add-on installer
Compiler exploits and exploitable non-obvious source code back doors.
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC by abusing shell protocol handlers
Proof-of-Concept of the Frontal Attack
A frequency replaying device working at 433mhz and 315mhz using Arduino board
A wifi tool using the esp32
The source code of our attacking tool described in the paper "Breaking and Fixing Gridcoin" published at WOOT'17, see also:
Kicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Evaluation of SVM and KNN in Website Fingerprinting Attack
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."