Peter Teoh's Projects
Collections of student projects to find execution path in binary program via taint analysis using Ghidra
Dump privileged ARM system registers from usermode using variant 3a of Meltdown
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Notes and exercise attempts for "An Introduction to Statistical Learning"
Open source software library for numerical computation using data flow graphs.
Tiger is a security tool that can be use both as a security audit and intrusion detection system.
zeus-style banking trojan
Linux system call fuzzer
A blog on the meaning of life
Automatically exported from code.google.com/p/turtle-graphics-explorer
Automatically exported from code.google.com/p/unladen-swallow
Oracle 10g/11g PL/SQL unwrapper 0.2 by Niels Teusink.
VirtualBox E1000 Guest-to-Host Escape
Automatically exported from code.google.com/p/volatility
Automatically exported from code.google.com/p/webscarab-ng
Automatically exported from code.google.com/p/webvulscan
WiFi arsenal
Wiki-like CTF write-ups repository, maintained by the community. 2016
Wiki-like CTF write-ups repository, maintained by the community. 2017
Windows Research Kernel
NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy as possible.