#
vulnaribility
Here are 7 public repositories matching this topic...
Turn your Kali NetHunter phone into a brute-force PIN cracker for screen locked Android devices
android
shell
usb
bruteforce
shell-script
pin
usb-hid
bruteforce-password-cracker
android-lock-screen
lockpicking
vulnaribility
android-devices
nethunter-phone
usb-hid-devices
android-pin-bruteforce
-
Updated
Jan 27, 2023 - Shell
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
-
Updated
Jan 25, 2018 - C
Search for c2 servers based on netlas
-
Updated
May 21, 2023 - Java
Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux
-
Updated
Oct 2, 2021 - C
-
Updated
Apr 22, 2021
Improve this page
Add a description, image, and links to the vulnaribility topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnaribility topic, visit your repo's landing page and select "manage topics."