Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
-
Updated
May 26, 2024 - C++
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Detect deauthentication frames using an ESP8266
Bypass UAC by hijacking a DLL located in the Native Image Cache
Bypass UAC by abusing the Internet Explorer Add-on installer
Compiler exploits and exploitable non-obvious source code back doors.
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC by abusing shell protocol handlers
Proof-of-Concept of the Frontal Attack
The source code of our attacking tool described in the paper "Breaking and Fixing Gridcoin" published at WOOT'17, see also:
A wifi tool using the esp32
Evaluation of SVM and KNN in Website Fingerprinting Attack
Code to Demonstrate Buffer Overflow Vulnerability in Simple Authentication Apps
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."