-
Updated
Nov 23, 2020
{{ message }}
A collection of awesome security hardening guides, tools and other resources
Respounder detects presence of responder in the network.
This repository contains resources to get you started in the field of your choice.
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
All the homeworks, studies and projects I've done at Metu-CENG
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
TriFlow: Triaging Android Applications using Speculative Information Flows
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
Upsolving is the KEY ! Documentation for everything related to past CTF participations.
My collection of awesome resources, tools, and other shiny things for cyber security stuffs.
Make your customized wordlist for penetration testing practice (brute force attack, dictionary attack, etc.)
[Archived] Analysis of the potential impact of IDN Homograph Attacks
Course material for a course on Computer Security
Centralized Command&Control botnet. Coursework in Computer Security 2015/2016.
LaTeX Bibliography for Research Papers on Security and Privacy
Suricata config to apply IDPS mode on Ubuntu 18.04 LTS
Cryptography Algorithm Implementations
Network security project that investigates the on-path "Great Firewall of China"
Built in a machine learning hackathon organised by National Stock Exchange, Mumbai, India
keylogger for Windows developed in C ++ as part of an ethical hacking course
Malware detection using N-Gram and machine learning.
A dockerized Capture The Flag challenge for computer science students. Get to know the basics !
Exploiting the vulnerabilities
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."