Program system to protect information/Программная система для защиты информации
-
Updated
Mar 10, 2017 - C
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Program system to protect information/Программная система для защиты информации
Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.
CS2107 Introduction to Information Security @ NUS SoC
My random code for a bunch of random ideas I get out of my noggin.
Hybrid encryption scheme using AES and DES
Homework repository for Information security course at Inha University
A Subject wise collection of codes made during my graduation
Manual de Prácticas en Seguridad Informática (Spanish)
Code Portfolio -- Collection of Interesting CS and ECE Projects in different languages (C, C++, Python, CPU & GPU Parallel Paradigms, MATLAB, and VHDL) and target hardware with technical reports, and my Vim Config
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
Собрание самых значимых работ, сделанных во время моего обучения в ИТМО на факультете безопасности информационных технологий.
This folder contains all course codes of 4th semester in IIT DU. The courses contain - DBMS, Information Security and Operating Systems.
AES Encryption and Decryption in C language
Codes for common ciphers and encryption techniques.
Contains some lab work of Public key encryption, Man-In-The-Middle Attack, RSA Algorithm, Transport Layer Security.
Collection of homework (programs) on the course "Operating Systems". All assignments are completed and presented in one project.
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Created by The cybersecurity community