Popular repositories Loading
-
ECDSA-Nonce-Reuse-Exploit-Example
ECDSA-Nonce-Reuse-Exploit-Example PublicThis code shows how you can extract a ECDSA private key from two messages signed with the same K value. Every signature must have been singed with a unique K value otherwise this attack is possible.
-
-
Honours-CTF
Honours-CTF PublicThe purpose of Honours-CTF is to demonstrate common vulnerabilities and explain how you can defend against attacks attempting to exploit these vulnerabilities.
JavaScript 1
-
Binary-Exploitation-Examples
Binary-Exploitation-Examples Publiclisted here are some vulnerable binary applications and custom exploits that I created. These applications were featured on Hack The Box and I solved them while they were active boxes.
Python 1
-
Windows-Driver-Hook-ZwEnumerateValueKey
Windows-Driver-Hook-ZwEnumerateValueKey PublicThis driver will hook the ZwEnumerateValueKey on 32 bit windows systems by hooking the function through the SSDT table. The malicious hook will hide registry keys with a name that contains "_root_"
C 1
-
Neural-Networks-Learning-Through-Genetic-Algorithms
Neural-Networks-Learning-Through-Genetic-Algorithms PublicThis code is an example of a feedforward neural network learning a simple game through genetic algorithms. The paper attached discusses my finding of the differences between genetic algorithm techn…
Python
If the problem persists, check the GitHub status page or contact support.