-
-
gsl
... of the system. All systems have key models, but they are usually hidden in the code and impossible to verify, formalise, or exploit fully. When the model is turned into a concrete language, it makes the software much better.
* We can produce extremely ...
-
Templ
... input, such as a ``,
which could enable him to execute code under the credentials of another user. This
security exploit is known as [XSS](http://en.wikipedia.org/wiki/Cross-site_scripting),
and is one of many related code execution ...
-
iourt4.1-logserver-patch
... his svn repo. You can find it [in the UrbanTerror forums](http://forums.urbanterror.info/topic/18495-svn-repository-for-iourbanterror-exploit-fixes/ "post by rambetter on urt forum").
USAGE
-----
* download and build the code: the executable will be ...
-
gomoz
... sqlite)
- 4 scanning modes : Gomoz performs a multi-thread scan
1- input scan :
scan one url + one exploit
2- single scan :
scan one url + all exploits
3- global scan :
scan all url + one exploits
...
-
Razor2-Client-Agent
... on a random number that
changes every so often. This makes the hashing scheme a moving target,
and spammers can't exploit it because they don't know which part of
the message will be hashed after the random number rollover.
3 Preprocessors ...
-
chaos
chaos is a node.js database
chaos - a node.js database
==========================
Why chaos? Because we exploit the sha1 chaotic randomness to store the keys evenly in the filesystem.
## NEW VERSION WARNING
This version is incompatible with ...
-
bashIRC
... $(bot.in "")
- Alternatively, you may use echo "stuff" >> $raw_input, however you may be vulnerable to the known exploit
- Using shellbot.input WILL NOT WORK
- Please update all scripts
= Known bugs
* Use -d as args for debug and -nohup ...
-
PnMPI
... cooperative PMPI tools
The package contains two main components:
* The PnMPI core infrastructure
* Tool modules that can explicitly exploit PnMPI's capabilities
So far, this software has mainly been tested on Linux clusters with RHEL-based
OS ...
-
biodiversity
... to rewrite code so that it is harder for the attacker to exploit the code reliably. This is done by changing the code. Consider ... to hack on something and may prove useful depending upon the exploit ecosystem.
Problem
So what is the issue? Why hasn't it ...
-
akypuera
... help to keep it updated
is very appreciated. As of now, we rely on custom scripts (written in
bash, perl, and julia) that exploit the more stable output of the
`otf2-print` tool. So far, we have been using such scripts to convert
OpenMP traces created ...
-