Displaying 1 to 20 from 24 results

meltdown - This repository contains several applications, demonstrating the Meltdown bug.

  •    C

The applications in this repository are built with libkdump, a library we developed for the paper. This library simplifies exploitation of the bug by automatically adapting to certain properties of the environment. This repository contains five demos to demonstrate different use cases. All demos are tested on Ubuntu 16.04 with an Intel Core i7-6700K, but they should work on any Linux system with any modern Intel CPU since 2010.

spikes - Where ideas & concepts are born & incubated

  •    Java

This is where we explore new ideas, hack around bug fixes and spark new code babies.

recyclerviewItemDecorations - ItemDecoration for Android Recyclerview

  •    Java

This project showcases some ItemDecorations for RecyclerViews. There is a blog post about the basics of drawing decorations and animating them along with the recyclerview. If you find something appealing, please go ahead and just copy it, the MIT license applies.

python-medusa - :snake: Python IRC botnet for controlling Mac OS X computers! (defeated by SIP & Gatekeeper)

  •    Python

Don't worry this bot is not a danger to anyone. It would be incredibly difficult to install it on anyone's computer these days as you'd have to disable SIP & Gatekeeper.If you somehow got this bot unintentionally, please remove it, it's not meant to be a virus.




es6-javascript-class-interop - Do ES6 classes classes play nicely with ES5 and CoffeeScript Classes?

  •    Javascript

Do ES6 classes classes play nicely with ES5 and CoffeeScript Classes?

html5edit - Lightweight R&D project surrounding HTML5's contenteditable feature

  •    CoffeeScript

HTML5 Edit is currently in the research and development phase. Its focus is HTML5's contenteditable feature, and goal is to find better ways of interacting with it.


mesh-botnet - :snake: Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)

  •    Python

python-medusa is a demo of simple intrusion and virus building concepts introduced in the book "Violent Python", to be run on the test bed provided by mesh-networking. The book is a a funny overview of Python & system security by a US Military Paratrooper, and I highly recommend checking it out. This is an ideal demonstration of the mesh-networking project because it needs a large, organic, networked app to show off its true capability. It would be incredibly difficult to install or get away with using this for malicious purposes in the real world. It makes no attempts to shield communications or evade filesystem detection in any way because the mesh-networking hosts are not adversarial and do not have any of the protection measures like SIP or Gatekeeper.

proof-of-concepts - A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability

  •    HTML

A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability. Clone this repository to a website you use for testing purposes, publish everything, and you will be able to use all of the proof of concepts under the /proof-of-concepts/ directory (e.g. http://example.com/proof-of-concepts/pastejacking_reflected_xss_payload.html).

Alba.Jaml - JAML = WPF XAML − XML.verbosity + JSON.elegance [Simplified BSD]

  •    CSharp

This library is NOT ready to be used in real projects. It's merely a proof-of-concept. If it gains substantial interest, I'll work on it more. Currently I need to make tough choices in architecture (see Open questions section below), and any input will be valuable.

context - A proof of concept implementation of scoped context

  •    Go

A proof of concept implementation of scoped context, proposed in this blog post. This library should not be used for production code.

quanti-team - :link: A TenderMint blockchain API to make collaborative work measurable & quantifiable

  •    Javascript

The abstract below has been taken from my MSc thesis paper QuantiTeam: Blockchain architecture as a medium to verify collaborative work. The full paper is available in PDF format here. The ability to work proficiently in collaboration with others is highly valued within a large number of social contexts. Yet, a person’s ability to do so is scarcely quantifiable in any meaningful way. The goal of this project was therefore to examine the feasibility of constructing a system which can verify and quantify collaborative work. The project was set in the specific context of attempting to solve student disengagement, as the larger concept arose from this concrete problem.

trace - Supply chain transparency platform PoC based on the Ethereum blockchain ✍️

  •    Javascript

A transparent supply chain management platform with end users in mind. Trace is a decentralized application based on the Ethereum blockchain aiming to let consumers see the data behind the products they buy every day. It currently allows industry experts to add products to the app, as well as create certifications that can be added to products. A mobile companion app (not developed yet) would allow scanning Trace QR codes placed on the actual products to see the data on-premise (e.g. at the grocery store).

postcss-atomised - Atomise standard CSS

  •    Javascript

This is probably not stable. It was initially developed for use on the Guardian website, but it feels like it's the wrong solution to the problem of bloat + complexity. Leaving it here in case anyone finds it useful or we pick it up again. PostCSS plugin that atomises a standard set of CSS, and provides a json map from the original classes to the atomised ones.

busysteg - :ghost: Hide information content into busy areas of images, optimally

  •    C++

Some parts of the image (for example, tree foliage) are busier than others (for example, the sky). It is possible to hide upto even 4 bits per 8 bit pixel in such areas, with no perceptible change to the image. Additionally, such modifications are virtually impossible to detect using common steganalysis techniques. The original idea for this is taken from a paper titled "Keyless dynamic optimal multi-bit image steganography using energetic pixels" by Goutam Paul et. al..