🔒 🔑 👮♂️ Pasword Hashing based on System.Security.Cryptography and OBVIEX
-
Updated
Apr 14, 2017 - C#
🔒 🔑 👮♂️ Pasword Hashing based on System.Security.Cryptography and OBVIEX
Implementation of all the basic Cryptogaphy algorithms and detailed procedure of Attacks.
Some Shell Scripts for System Exploitation
Seminar paper for class Security of Information Systems on subject "Managed Security Service Providers".
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Using domain name on IPtables. Keep updated firewall rules from dynamic DNS (DDNS).
Intrusion Detection in Computer Systems using Machine Learning Models.
These are just random experiments and practical programs written by me during college.
🐧🔥System security testing tools(compatible with Debian/Centos/Ubuntu/Kali/Mint,use the nmap and hydra security testing tools)
Securinator will streamline Network Administrationby saving time issuing commands by outputing time consuming commands to a TXT file and then displaying the results in a Command Prompt to avoid having to use long commands repededly. Securinator is good for compairing system and file properties aswell as seeking seeking out malware manually and …
This is a complete guide to securing your AWS servers for algorihtmic trading.
ini merupakan repository kumpulan kode sumber (source code) yang digunakan untuk melakukan pengenalan wajah (facerecognition) dengan menggunakan pustaka OpenCV
A world UI to fix capitalism by putting Demand in front of Supply. People dynamically input what they would buy with $150K salary, and then we reverse-engineer and align work and resources to make what we want.
A repository to hold code for security related examples
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] SEMESTER VI
Usermode rootkit scanner written in C x86 + x86_64
Add a description, image, and links to the system-security topic page so that developers can more easily learn about it.
To associate your repository with the system-security topic, visit your repo's landing page and select "manage topics."