🌐🔒 Successfully completed a Capture-The-Flag (CTF) challenge, as part of YS13 Cyber-Security class.
-
Updated
Feb 15, 2022 - Python
🌐🔒 Successfully completed a Capture-The-Flag (CTF) challenge, as part of YS13 Cyber-Security class.
Um gerador de senhas forte, com uma simples interface, Onde faz a mesclagem de varios 'tipos' de caracteres, Retornando uma senha forte entre 12 a 32 digitos.
Third Year Information Technology (2019 Course)- 314458: Lab Practice –II (Cyber Security)
Mainframers is RPG is an educational text-based role-playing game (RPG) with a sneakers theme that aims to teach players about IBM mainframe penetration testing and cybersecurity.
DDoS-Detection project.
Pixel Manipulation for Image Encryption
Kaspersky TIP unofficial API for Python
virus.exchange wrapper for python
cybercure.ai python SDK to digest cybercure free cyber threat intelligence feeds
Prodigy InfoTech Cyber-Security Internship Task#2
Telegram Backdoor for supreme control over Viticum
This project focuses on utilising external adversary nodes with passive listening to accurately detect IDS positions in Underwater Acoustic Networks (UWANs), while mapping network topology and identifying potential blind spots for strategic vulnerability exploitation.
Basic blockchain implementation.
Advanced Python script for SSH brute force attacks with multi-threading, custom SSH ports, and error handling.
The Python3 parser for ADeLe, the language to describe the effects of cyber-physical attacks against cyber-physical systems and complex networks.
go to https://drive.google.com/file/d/1fo4mJ6Q-CSGnQObqpL7yuG8uB9Fcop5d/view and download it extract it then type in terminal cd go to install folder type chmod +x install.sh all required module install automatically it will take 10 minut to install all require modules then type cd .. to back from install folder then chmod +x ed for converting e…
Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malware and its extent.It deals with the change in network traffic flow.It is developed in Python in Jupyter notebook.
Prodigy InfoTech Cyber-Security Internship Task#3
Prodigy InfoTech Cyber-Security Internship Task#4
Prodigy InfoTech Cyber-Security Internship Task#5
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."