Scripts & files used for various hacking competitions & CTFs
-
Updated
Nov 14, 2016 - HTML
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Scripts & files used for various hacking competitions & CTFs
InfoSec Training, Community, and Competition
Open a reverse shell in a web page using HTTP
Security related improvements to be contributed to an open source software project
Undergraduate research at Cybersecurity Lab. Data visualization of a parallel coordinates graph to rapidly detect possible network anomalies.
Demonstrate Nextgen Quantum Blockchain on AIHPC (https://aws.amazon.com/marketplace/pp/B01JJ31R8C) to Defend Quantum Attacks. Contact: demo@deepcybe.com
Live md5 hasher
E-textbook on the "Cybersecurity" course (JavaFX)
UISGCON Materials. The birthplace of Ukrainian cybersecurity. Upcoming event: October 26, 2018 / Kiev, Ukraine
Cyber Anomaly Detection using RNN Language model
Mining user networks for predicting cyber attacks
Educational Software for Cyber Security. Built as a project for ISOE532C Course
This solution performs Anomaly Detection with Statistical Modeling on Spark. The detection is based on Z-Score calculated on cpu usage data collected from servers.
Created by The cybersecurity community