Pinned Repositories
Binary-Exploitation-Examples
listed here are some vulnerable binary applications and custom exploits that I created. These applications were featured on Hack The Box and I solved them while they were active boxes.
django-simple-app
just a simple django app
ECDSA-Nonce-Reuse-Exploit-Example
This code shows how you can extract a ECDSA private key from two messages signed with the same K value. Every signature must have been singed with a unique K value otherwise this attack is possible.
Homehub3000-Router-Hashcracker
I noticed my Bell Homehub 3000 router was using HTTP for authentication. If an attacker is able to capture authentication packets, they will find a nonce and a hashed key. I reversed engineered this hashing process and created a cracker for it.
Honours-CTF
The purpose of Honours-CTF is to demonstrate common vulnerabilities and explain how you can defend against attacks attempting to exploit these vulnerabilities.
Neural-Networks-Learning-Through-Genetic-Algorithms
This code is an example of a feedforward neural network learning a simple game through genetic algorithms. The paper attached discusses my finding of the differences between genetic algorithm techniques.
Python-Flask-App
This is an example app made with python and the flask framework. It connects to a local sqlite server and allows users to create an account, post and comment.
RailsApp
just a simple rails app for learning purposes.
System-Mechanic-Exploit
Windows-Driver-Hook-ZwEnumerateValueKey
This driver will hook the ZwEnumerateValueKey on 32 bit windows systems by hooking the function through the SSDT table. The malicious hook will hide registry keys with a name that contains "_root_"
Marsh61's Repositories
Marsh61/ECDSA-Nonce-Reuse-Exploit-Example
This code shows how you can extract a ECDSA private key from two messages signed with the same K value. Every signature must have been singed with a unique K value otherwise this attack is possible.
Marsh61/System-Mechanic-Exploit
Marsh61/Binary-Exploitation-Examples
listed here are some vulnerable binary applications and custom exploits that I created. These applications were featured on Hack The Box and I solved them while they were active boxes.
Marsh61/Honours-CTF
The purpose of Honours-CTF is to demonstrate common vulnerabilities and explain how you can defend against attacks attempting to exploit these vulnerabilities.
Marsh61/Windows-Driver-Hook-ZwEnumerateValueKey
This driver will hook the ZwEnumerateValueKey on 32 bit windows systems by hooking the function through the SSDT table. The malicious hook will hide registry keys with a name that contains "_root_"
Marsh61/django-simple-app
just a simple django app
Marsh61/Homehub3000-Router-Hashcracker
I noticed my Bell Homehub 3000 router was using HTTP for authentication. If an attacker is able to capture authentication packets, they will find a nonce and a hashed key. I reversed engineered this hashing process and created a cracker for it.
Marsh61/Neural-Networks-Learning-Through-Genetic-Algorithms
This code is an example of a feedforward neural network learning a simple game through genetic algorithms. The paper attached discusses my finding of the differences between genetic algorithm techniques.
Marsh61/Python-Flask-App
This is an example app made with python and the flask framework. It connects to a local sqlite server and allows users to create an account, post and comment.
Marsh61/RailsApp
just a simple rails app for learning purposes.
Marsh61/Spring-Microservices-Example
is this an example of how a microservice environment should be setup, We have a reverse proxy (Zuul) directing the end-users requests to a spring boot service, these spring boot microservices are connected to a service manager (Eureka). For demonstration purposes the Api is inflicted with vulnerabilities & we have a chef server managing the microservice.