GitHub topics: networksecurity
mmguero-dev/Malcolm Fork of idaholab/Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Language: Python - Size: 232 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 11 - Forks: 0

idaholab/Malcolm Fork of cisagov/Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Language: Python - Size: 232 MB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 402 - Forks: 61

alexjungaalto/FederatedLearning
Material workbench for the master-level course CS-E4740 "Federated Learning"
Language: Jupyter Notebook - Size: 223 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 125 - Forks: 47

ahmeddwalid/Needham-Schroeder-protocol
Needham Schroeder protocol implementation for the Networks Security midterm project
Language: Python - Size: 17.6 KB - Last synced at: 4 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

xAGUSTINx/WanControl
Wan2.1 with Controlnet
Language: Python - Size: 7.44 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 1 - Forks: 0

XploitPoy-777/0x-ASN-Processor
All-in-One Master ASN Processing with 0x ASN Processor | CIDR, DNS, IP & Port Scanning Made Easy!
Language: Shell - Size: 4.41 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 3 - Forks: 0

Lasara26/Attack-Detection-with-Machine-Learning
This project focuses on detecting cyber attacks using machine learning techniques. It employs various algorithms to analyze network traffic and identify potential threats in real-time.
Language: Python - Size: 2.37 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

HalilDeniz/NetProbe
NetProbe: Network Probe
Language: Python - Size: 36.1 KB - Last synced at: 7 days ago - Pushed at: 7 months ago - Stars: 154 - Forks: 26

SRUJAN-BANDARU/Cybersecurity
This is a project on Network Penetration Testing
Size: 6.39 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

oyoycr/Conference-Accepted-Paper-List
Some Conferences' accepted paper lists (including Network, Security, AI) 顶会近五年论文列表
Size: 80.1 KB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 1 - Forks: 0

TimInTech/Pi-hole-v6.0---Comprehensive-Guide
Pi-hole v6.0 introduces significant improvements over previous versions, enhancing performance, domain filtering, and API integration for better management.
Size: 64.5 KB - Last synced at: about 7 hours ago - Pushed at: about 1 month ago - Stars: 2 - Forks: 0

cisagov/Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Language: Python - Size: 214 MB - Last synced at: 16 days ago - Pushed at: 25 days ago - Stars: 2,093 - Forks: 353

Areenzor/Cyber-Security-Books
A Cybersecurity Book Collection for domains: Network Security, Application Security, Cloud Security, Penetration Testing, Digital Forensics, Cryptography & more.
Size: 93.4 MB - Last synced at: 24 days ago - Pushed at: 24 days ago - Stars: 0 - Forks: 0

casterbyte/MITMonster
A monster cheatsheet on MITM attacks
Size: 1.48 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 343 - Forks: 33

txuswashere/pentesting
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
Size: 36.4 MB - Last synced at: about 1 month ago - Pushed at: about 2 years ago - Stars: 26 - Forks: 3

harshinsecurity/security-interview
Security Engineer Interview Questions
Size: 851 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

heshanthenura/netwok
Netwok is a powerful and lightweight network security tool built with Python and Scapy. It provides various features to analyze, manipulate, and secure networks, making it useful for cybersecurity enthusiasts, ethical hackers, and network engineers.
Language: Python - Size: 9.6 MB - Last synced at: 26 days ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

Think-Cube/terraform-azure-virtual-network-with-bastion-host
Terraform modules for Azure virtual networks, subnets, and a bastion host.
Language: HCL - Size: 104 KB - Last synced at: 26 days ago - Pushed at: 26 days ago - Stars: 0 - Forks: 0

ELFO-1/iot_scanner_v2
Ein Python-basiertes Tool zur Erkennung, Analyse und Schwachstellenprüfung von IoT-Geräten in lokalen Netzwerken.
Language: Python - Size: 392 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

jacobstickney/ThreatActorProcedures-MITRE-ATTACK
A collection of specific commands used by threat actors, detailing their procedural implementations of tactics and techniques from the MITRE ATT&CK framework.
Size: 126 KB - Last synced at: 15 days ago - Pushed at: 3 months ago - Stars: 7 - Forks: 2

3rr0r-505/HoneyPott3r
HoneyPott3r is a Python-based honeypot vulnerability scanner.
Language: Python - Size: 311 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

kirula0626/Home-Network-Project
SOHO Project
Size: 55.7 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

sleetymattgeorge/Deep-Learning-Evaluation-of-IDS-Datasets
Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.
Language: Jupyter Notebook - Size: 5.8 MB - Last synced at: 2 days ago - Pushed at: almost 2 years ago - Stars: 15 - Forks: 1

brgkdm/Network-Force-Processes
This repository provides a comprehensive guide to network security and penetration testing. It covers VPN and DNS leak testing, passive network monitoring, network scanning, information gathering, and brute force methods. Aimed at ethical hackers and cybersecurity enthusiasts, it offers practical tools to secure networks and detect vulnerabilities.
Size: 24.4 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

Quarrezz/CyberScan
CyberScan : Network Analysis
Language: Python - Size: 21.5 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

Projects-Developer/AES-Communication-Security-Project
This project involves designing and implementing a secure communication system using the Advanced Encryption Standard (AES) algorithm. Project Includes Source Code, PPT, Synopsis, Report, Documents, Base Research Paper & Video tutorials
Size: 6.84 KB - Last synced at: 2 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Projects-Developer/Malware-detection-project
This project aims to design and develop an efficient malware detection system using machine learning and deep learning techniques. Malware Detection System Project Includes Source Code, PPT, Synopsis, Report, Documents, Base Research Paper & Video tutorials
Size: 4.88 KB - Last synced at: 2 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Projects-Developer/Cryptography-Communication-System-Project
This project aims to design and develop a secure communication system using cryptographic techniques, ensuring confidentiality, integrity, and authenticity of transmitted data. Cryptography Communication Project Includes Project Includes Source Code, PPT, Synopsis, Report, Documents, Base Research Paper & Video tutorials
Size: 4.88 KB - Last synced at: 2 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Projects-Developer/Network-Intrusion-Detection-Using-Machine-Learning-Project
The Network Intrusion Detection Using Machine Learning Project aims to develop a machine learning-based system for detecting network intrusion Project Includes Project Includes Source Code, PPT, Synopsis, Report, Document , Base Research Paper & Video tutorials
Size: 6.84 KB - Last synced at: 2 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

ECCENTRIX-CA/Understanding-the-Cyber-Kill-Chain
Lockheed Martin's Cyber Kill Chain aids in cybersecurity defense strategies.
Size: 6.84 KB - Last synced at: 2 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

Anurag-Dutta/RISK-4-Auto
Visual Technique for In-Vehicle Network Traffic Classification
Language: Jupyter Notebook - Size: 1.07 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

shiwildy/SIMSECRSDAVID 📦
Simulasi Security jaringan RS David [ TUGAS KULIAH SAJA ]
Language: Go - Size: 8.01 MB - Last synced at: 11 days ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

ECCENTRIX-CA/Understanding-the-Difference-Between-VPN-and-VNet-Peering-in-Azure
In this article, we explore the differences between VPN and VNet Peering in Azure, two key technologies for network connectivity.
Size: 5.86 KB - Last synced at: 2 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

kvakirsanov/net-delta-monitor
NetDeltaMonitor is a comprehensive network reconnaissance and port scanning tool designed with a focus on security and continuous monitoring.
Language: Python - Size: 11.7 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 2 - Forks: 0

richard-sebos/firewall_wifi_pentest
Explore this open-source project designed for penetration testing of firewalls and Wi-Fi networks to identify vulnerabilities and enhance network security. Ideal for cybersecurity professionals and enthusiasts looking to improve network protection
Size: 21.5 KB - Last synced at: 23 days ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

iAnonymous3000/remote-nonprofit-netsec-guide
Size: 422 KB - Last synced at: 2 months ago - Pushed at: 4 months ago - Stars: 2 - Forks: 0

Anurag-Dutta/KAN-Vis
Visual Technique for Network Traffic Classification
Language: Jupyter Notebook - Size: 2.05 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

nakyung1007/Capston_design_ADOSI
2024년 1학기 산학캡스톤 디자인 ADOSI 입니다.
Language: Python - Size: 142 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

adithya16pillai/Cryptography_and_network_security
Cryptography and Network Security
Language: C++ - Size: 40 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

imfj25/Intrusion-Detection-System
based on machine learning
Size: 8.02 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

lmolinario/Network_Security_Project
This project is developed for the UNICA.IT University Network Security exam.
Language: Python - Size: 90.9 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

SnowFish00/httpcapture
tcp(包含http)(未包含https) udp(全类型)流量抓取 以及poc采集 ids项目
Language: Go - Size: 564 KB - Last synced at: 6 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

Liragbr/PortScanner
PortScanner is a C# tool for identifying open ports on target systems, crucial for network security. It offers fast, multi-threaded scanning and detailed reports, perfect for network administrators and cybersecurity professionals.
Language: C# - Size: 5.86 KB - Last synced at: about 1 month ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

TFashakin/Port_Scanner
Simple and efficient port scanner designed for home network use, detecting open ports over IPv4 or TCP connections.
Language: Python - Size: 2.93 KB - Last synced at: 6 months ago - Pushed at: 7 months ago - Stars: 1 - Forks: 0

MoulyaAS/Honeypot-Using-Pentbox
This guide will walk you through the installation, setup, and usage of Pentbox 1.8, focusing on the honeypot functionality for network monitoring and security.
Size: 4.88 KB - Last synced at: 6 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

sondosaabed/Networks-and-Network-Security
By the end of this course, I developed a greater understanding of network architecture, operations, intrusion tactics, common types of network vulnerabilities and attacks, and how to secure networks. I also was introduced to common network protocols, firewalls, virtual private networks (VPNs), and system hardening practices.
Language: Jupyter Notebook - Size: 875 KB - Last synced at: 17 days ago - Pushed at: 9 months ago - Stars: 4 - Forks: 0

9QIX/Google-Cybersecurity-Certification-Notes
This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.
Size: 50.3 MB - Last synced at: 7 months ago - Pushed at: 8 months ago - Stars: 13 - Forks: 7

HalilDeniz/HalilDeniz
HalilDeniz
Size: 1.25 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 8 - Forks: 0

Raafay009/SMB-Spy
Language: HTML - Size: 44.6 MB - Last synced at: 8 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

MrTechyWorker/NetHitX
NetHitX is an ethical hacking tool crafted for educational purposes, empowering users to perform responsible security assessments and tests on WiFi networks WITHOUT ANY ADDITIONAL HARDWARE. Always ensure explicit permission to use this script on target networks and adhere to all applicable laws and ethical guidelines.
Language: Python - Size: 23.5 MB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 2 - Forks: 0

CSPF-Founder/shieldsup
Shieldsup Scanner is a robust vulnerability scanner with an integrated bug tracker. It simplifies the tracking and fixing of vulnerabilities across your systems. By combining naabu port scanning and nuclei vulnerability scanning, Shieldsup Scanner identifies more vulnerabilities and covers a broader range of targets than nuclei alone.
Language: Go - Size: 3.06 MB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 1 - Forks: 1

3CORESec/testmynids.org
A website and framework for testing NIDS detection
Language: Shell - Size: 5.23 MB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 185 - Forks: 16

okankurtuluss/domain-checker
This script checks the availability of domain names and retrieves WHOIS information for the specified domains. It supports checking multiple TLDs and generates variations of the given domain name to identify possible typosquatting.
Language: Python - Size: 474 KB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

Zierax/LNK-payload-gen
LNK-Payload-Generator is a Python script for creating customizable Windows shortcut (LNK) files with multi-language support (English, Russian, Chinese). It facilitates environment variable exfiltration and NTLM hash extraction, functioning across Windows and non-Windows platforms using platform-specific libraries.
Language: Python - Size: 20.5 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

ECCENTRIX-CA/Web-Application-Firewalls
This article delves into the workings of WAF technology, provides concrete examples and use cases, and offers insights into how organizations can leverage this technology for enhanced security.
Size: 6.84 KB - Last synced at: 2 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

Nelson-PROIA/network-security-ccm
This project provides a Java implementation of Counter with CBC-MAC (CCM) mode for AES encryption and decryption. CCM mode combines Counter (CTR) mode for encryption with CBC-MAC for tag generation, supporting additional authenticated data (AAD) along with plaintext.
Language: Java - Size: 569 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

Nelson-PROIA/network-security-aes
This project provides a Java implementation of AES (Advanced Encryption Standard) encryption algorithm. AES is a symmetric key encryption algorithm widely used for securing sensitive data.
Language: Java - Size: 18.3 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

kahramankostas/IoTGeM
IoT Attack Detection with machine learning
Language: Jupyter Notebook - Size: 78.7 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 6 - Forks: 3

jacobstickney/sigmarules
Size: 36.1 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

martinmathurine/Windows-Event-Log-Analyser
This is a PySimpleGUI-based Python software tool for processing and visualising selected Windows Event Security.evtx log files that meet a condition in Event ID 4688.
Language: Python - Size: 48 MB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 4 - Forks: 0

lfazioli/IP-SCAN
This is a simple script, we use python for IP SCAN on internet
Language: Python - Size: 116 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

VEXMAN-hacks/nmap
VEXMAN - A powerful Nmap replication tool for network scanning and analysis.
Language: Python - Size: 10.7 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

HalilDeniz/Dosinator
DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.
Language: Python - Size: 704 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 115 - Forks: 17

HalilDeniz/NetworkAssessment Fork of alperenugurlu/Network_Assessment
NetworkAssessment: Network Compromise Assessment Tool
Language: Python - Size: 462 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 90 - Forks: 18

HalilDeniz/PacketSpy
PacketSpy
Language: Python - Size: 267 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 122 - Forks: 26

hm3dd/PyQtChat
A personal project that consists of a chat application with a graphical user interface (GUI) developed in Python using PyQt5 and operates over TCP/IP.
Language: Python - Size: 990 KB - Last synced at: 4 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

mpawl/paydirt
Pay Dirt
Language: Python - Size: 23.4 KB - Last synced at: 12 months ago - Pushed at: 12 months ago - Stars: 1 - Forks: 0

cdot65/pan-os-typescript
TypeScript SDK for PAN-OS and Panorama appliances
Language: TypeScript - Size: 1.27 MB - Last synced at: about 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

lucideus-repo/cybergym
Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.
Language: Java - Size: 16.7 MB - Last synced at: 12 months ago - Pushed at: over 3 years ago - Stars: 69 - Forks: 14

SmartHomePrivacyProject/DeepVCFingerprinting
Language: Python - Size: 68.1 MB - Last synced at: 12 months ago - Pushed at: about 1 year ago - Stars: 8 - Forks: 6

HimuCodes/Especially-Safe
This is the project I made as a solution for one of the biggest problems in IOT devices. This project encrypts data and packets transferred by Esp 32 with three layers of encryption.
Language: C++ - Size: 6.84 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

Think-Cube/AwesomeSecurity
Discover an awesome compilation of tools, libraries, and resources for robust security. From network to web security, find everything you need to enhance your security expertise.
Size: 73.2 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

zeuscybersec/ARP_Cache_Poison
ARP Cache Poisioning Tool written in Python☣️
Language: Python - Size: 3.91 KB - Last synced at: about 1 year ago - Pushed at: almost 4 years ago - Stars: 0 - Forks: 0

imsiddhant/Palo-Alto-Networks-Cybersecurity-Specialization
This repository shows all the hands on experience on Palo Alto Firewall, assignment and projects I have done in My Palo Alto Specialization Journey.
Size: 1.91 MB - Last synced at: about 1 year ago - Pushed at: almost 5 years ago - Stars: 6 - Forks: 5

fazal-hashmi/VoiceAssistantSecResearch
Explore security research on voice assistants like Google Home Mini. This repository houses Python scripts, Scapy-based tools, and findings to enhance awareness and address vulnerabilities in the realm of voice-controlled smart homes.
Language: Python - Size: 10.8 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

ct0l4/vulnyx.github.io Fork of VulNyx/vulnyx.github.io
VulNyx is a website that contains a list of vulnerable machines that are Unix based.
Language: HTML - Size: 2.34 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

misterkrittin/CCNA-Labs
CCNA-Labs From Zero 🔥🔥
Size: 1.74 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

Giotto12138/Network-Security
Network Security Practice
Language: Python - Size: 3.24 MB - Last synced at: over 1 year ago - Pushed at: about 5 years ago - Stars: 0 - Forks: 0

thecoderhead/net-watch
The script allows the user to input a host IP, port, and threshold for number of connections. The user can also select the protocol for monitoring either TCP or UDP. The script then starts a thread to monitor the network connection and it raises an alert if the threshold is exceeded. The user can start and stop monitoring with simple buttons.
Language: Python - Size: 1.95 KB - Last synced at: over 1 year ago - Pushed at: over 2 years ago - Stars: 1 - Forks: 0

nijithneo/InfoSecLibrary
Welcome to InfoSecLibrary – Your comprehensive resource hub for cybersecurity enthusiasts! Explore a curated collection of PDFs covering penetration testing, network security, ethical hacking, and more. Enhance your knowledge in the ever-evolving world of information security.
Size: 161 MB - Last synced at: about 1 year ago - Pushed at: over 1 year ago - Stars: 6 - Forks: 3

almteodorom/-HODL-DRAINER-
✅Unlock the perfect balance of functionality and cost! Message us on Telegram for a discount on our top-tier solution.
Size: 2.93 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

ybringsvalle/TEMPLATE-DRAINER
✅Experience the pinnacle of market Crypto Drainer 🛒 s unbeatable in price, featuring the latest advancements, and delivering full functionality.
Size: 0 Bytes - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

aedetestingg/EXCHANGE-DRAINER
✅Elevate your experience with the market's best Crypto Drainer 🛒 —offering the lowest price, newest features, and unparalleled functionality.
Size: 2.93 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

rwovenxkyears/ETH-Drain
ETH Drain
Size: 1000 Bytes - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

frolics97/Avalanche-Drain
Avalanche Drain
Size: 0 Bytes - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

ckson05444/Swap-Drainer
Swap Drainer
Size: 1000 Bytes - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

AbhishekD2424/EDI_in_Edge_Computing
Created a system to check the Effective Data Integrity in Edge Computing using the Botan library in C++. Created a simple UDP connection that allowed checking the integrity of any shared file by generating unique tags based on the theoretical research paper.
Language: C++ - Size: 949 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

AbhishekD2424/FOGCPS
Created an entire Fog-enabled cyber Physical system, based on many theoretical research papers. Utilizing the Pairing Based Cryptography(PBC) library created an entire system of machines that could communicate and interact via encrypted messages, shared via UDP connection, which were encrypted using ECC encryption and tag generation methodology.
Language: C++ - Size: 5.68 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

Simge-Koctas/Ceng519
Metu CENG519 MSc Network Security Project
Language: Python - Size: 1.4 MB - Last synced at: over 1 year ago - Pushed at: almost 3 years ago - Stars: 0 - Forks: 0

christiangoeschel/PingSweeper
PingSweeper™ is a Network Discovery and Information Gathering tool. The software uses multiple scanning techniques and summarizes all the findings in a structured manner and makes the network analysis process more efficient.
Language: Shell - Size: 11.7 MB - Last synced at: over 1 year ago - Pushed at: about 2 years ago - Stars: 2 - Forks: 0

ShubhamJagtap2000/Computer-Networking
Computer Networking knowledge every ethical hacking and cybersecurity enthusiast should know
Size: 48.8 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 5 - Forks: 1

Bosshero476/Network-Security
Data Encryption Standards
Language: Jupyter Notebook - Size: 140 KB - Last synced at: over 1 year ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

rickxy/Networking-Bank-System
This network design is only meant for a small scale organisation (Micky Bank) where the access point could support approximately 200 users. The extra or unused port either on layer 2 or 3 switch could be reserved for further use especially when there is a need of expanding the network usage.
Size: 460 KB - Last synced at: over 1 year ago - Pushed at: almost 4 years ago - Stars: 2 - Forks: 0

Moabifokotsane/specialbruteforce-
Let me just put this here & You go check if your sever is tight. **updated version is PRIVATE** Incl Full Internet & Personal Password List From Leaked Databases, Hacked Accounts & Wifi Attack Victims
Language: Python - Size: 5.86 KB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

SahithiCharitha/AES-GCM
single network end-point and multiple clients that can connect to this network.Security implmentation using certificates and AES
Language: Python - Size: 9.77 KB - Last synced at: almost 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

anuragpatil66/Async-Port-Scanner
Unleash the Power of Networks! Lightning-fast asynchronous scanning and service identification for all your cybersecurity exploration needs.
Language: Python - Size: 50.8 KB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

kceedc0396/kmucybersecuritytutorials.github.io
School website
Language: HTML - Size: 928 KB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

KamiKaramazov/PyScanner
A Python-based port scanner that allows you to use multiple threads to search a given IP address for open ports. Simply specify the starting and terminating port numbers, as well as the number of threads to utilize.
Language: Python - Size: 23.4 KB - Last synced at: about 2 months ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

c4s73r/Gretchen
A tool to stop the Responder attacks by Caster
Language: Tcl - Size: 1.58 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 13 - Forks: 4

aktechnohacker/Windows-wifi-password-stealer
Get All Registered Wifi Passwords from Target Computer.
Language: Python - Size: 6.32 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 5 - Forks: 2
