Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
-
Updated
Jul 5, 2023 - C++
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
MOC3ingbird Exploit for Live2D (CVE-2023-27566)
Fuzz testing framework for network protocols.
🔐 Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
Trabalho final sobre falhas de códigos em C para OSRC0001.
Spectre attack variant 1 is used here to extract an image data buffer from a program. The output image data is then decoded and median filters are applied to remove the hot pixels in the output image. Here I have included files for RGB and base64 format.
This project presents an algorithm to assess the impact of a breach in a Virtual Machine (VM) network, ranking infected VMs by severity based on their connection types (Peer-to-peer > TCP > UDP > ICMP). It aids security administrators in prioritizing their response to contain and mitigate the breach's effects.
Light course on "Function Hooking" for my Software Security module. Powerpoint + demo included
Oct 29 - 30, 2024 • San Francisco, CA