#
attack
Here are 22 public repositories matching this topic...
Detect deauthentication frames using an ESP8266
arduino
esp8266
detect
attack
exploit
wifi
detector
deauth
wi-fi
prevention
deauthentication
disassociation
-
Updated
Nov 26, 2021 - C++
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
attack
zip
thread
openmp
password
plaintext-attack
ciphertext
cracking
plaintext
crack
multithread
pkzip
zipcracker
zipcrypto
-
Updated
Mar 6, 2022 - C++
Bypass UAC by hijacking a DLL located in the Native Image Cache
-
Updated
Nov 21, 2021 - C++
Computer Vision Game Development. Neural Network Configurable Aimbot for FPS games with custom training mode
training
recognition
attack
neural-network
fps
league-of-legends
game-development
aimbot
fps-game
auto-scroll
configurable
object-recognition
neural-nets
cursors
unreal-engine-4
glitches
name-tags
fortnite
pixel-memory
combatarms
-
Updated
Aug 5, 2020 - C++
Compiler exploits and exploitable non-obvious source code back doors.
-
Updated
Sep 5, 2016 - C++
Bypass UAC by abusing the Internet Explorer Add-on installer
-
Updated
Jul 12, 2021 - C++
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
-
Updated
Jul 12, 2021 - C++
Bypass UAC at any level by abusing the Task Scheduler and environment variables
-
Updated
Jul 12, 2021 - C++
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
-
Updated
Jul 12, 2021 - C++
Bypass UAC by abusing shell protocol handlers
-
Updated
Jul 12, 2021 - C++
Proof-of-Concept of the Frontal Attack
-
Updated
Dec 11, 2021 - C++
The source code of our attacking tool described in the paper "Breaking and Fixing Gridcoin" published at WOOT'17, see also:
-
Updated
Aug 14, 2017 - C++
Evaluation of SVM and KNN in Website Fingerprinting Attack
machine-learning
privacy
attack
website-fingerprinting
traffic-analysis
tor-network
privacy-enhancing-technologies
-
Updated
Feb 27, 2019 - C++
Some projects written by me at the University. :) http://tu-plovdiv.bg
game
c
visual-studio
attack
cplusplus
game-engine
oop
game-development
inheritance
binary-search-tree
binary-tree
operator
estate
polymorphism
hashtable
phonebook
bank-account
operator-overloading
oop-examples
inheritance-examples
-
Updated
Jul 27, 2020 - C++
Code to Demonstrate Buffer Overflow Vulnerability in Simple Authentication Apps
-
Updated
Sep 22, 2018 - C++
[NTUA-ECE] Assignment for "Programming Techinques" at National Technical University of Athens department of Electrical and Computer Engineering (2016).
attack
hit-points
ntua
programming-techniques
ntua-ece
classes-and-objects
classes-and-inheritance
character-person
zombie-characters
character-points
-
Updated
Nov 22, 2020 - C++
Implementation of all the basic Cryptogaphy algorithms and detailed procedure of Attacks.
-
Updated
Dec 9, 2017 - C++
Multiprocessing MPI dragon attacker game
-
Updated
Nov 12, 2019 - C++
Improve this page
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."