-
-
directory-changed-listener
... whatever action you want at the time a directory change is noticed. For example, maybe you want to send an email because an intruder has hacked into your files! Whatever it is, this is the file where you work your magic.
### Important note:
You must ...
-
build-monitor
... : "kilter"
},
{
"userName" : "other.person",
"karotzName" : "INTRUDER"
}
]
},
"jobs" : [
{
"name" : "a jenkins ...
-
BurpCommander
... exploitation
This is a Burp Suite extension intended to be used to simplify command injectiontesting.
It operates similar to the intruder tab in Burp, allowing you to select positions, and then switches the value at that position with a command to be ...
-
PingMe
... from this, the messages sent to server from your phones are encrypted using RSA and further serialized so that no intruder can capture these packets and decode the information.
## Approach ##
The entire PingMe project actually consists of four smaller ...
-
thp-assignment2_save-DSV.SU
... in the
# toches to do anything with.
This means that if an intruder is actively in the pot, you WON'T see a log
entry. ... IDs (session filenames, as well) are derived from the start time of
the intruder's data, not his connection. There may be a gap of a ...
-
serialization
... ://raw.github.com/mturkia/serialization/master/images/history.png)
### Intruder
Following screen shot shows the XML format of a ... of from the request that is actually sent out).
![Intruder](https://raw.github.com/mturkia/serialization/master/images/ ...
-
mie-ibe
... .
Successfully deployed SSO increase security level. Usual user prefers set the same password everywhere, in all applications. So if an intruder cracks the weakest system he gets an access to all systems. SSO systems have good secure background and some ...
-
BurpAMFDser
... to XML. Decoded XML should be in "Edited Request" and "Original Response" tabs.
- Fuzz the request using Repeater/Intruder. Request will be automatically serialized back to binary format and response will be deserialized in XML format
###3 Bypass client ...
-
stamp-rtm
... routing benchmark
lib/ -------- Common libraries (data structures, etc.)
genome/ ----- Gene sequencing benchmark
intruder/ --- Network intrusion detectino benchmark
kmeans/ ----- K-means clustering benchmark
ssca2/ ------ Graph kernel ...
-