Noktec

Noktec

Geek Repo

Company:Lupovis

Location:Glasgow, United Kingdom

Home Page:https://www.lupovis.io

Twitter:@noktec

Github PK Tool:Github PK Tool

Noktec's repositories

ARP-Spoof-SI

ARP Spoof SI is an application that uses ARP packets for establishing a Man In The Middle attack.

Language:CStargazers:2Issues:2Issues:0

Knuth-Morris-Pratt

Knuth-Morris-Pratt Algorithm

Language:CStargazers:2Issues:2Issues:0

Strachlyde-EEE-Beamer-Template

Unofficial Strathclyde EEE Beamer Template

Language:PostScriptStargazers:2Issues:3Issues:0

UDPacketGenerator

UDP Packet Generator

Language:CStargazers:2Issues:3Issues:0

CryptoKnight

Cryptographic Dataset Generation & Modelling Framework

Language:PythonLicense:Apache-2.0Stargazers:0Issues:2Issues:0

CS312

Website

Language:PHPStargazers:0Issues:3Issues:0

HEPFAC_ChatGPT

Implementation of HEPFAC on CPU and GPU from ChatGPT

Language:CudaStargazers:0Issues:2Issues:0

IncludeOS

A minimal, resource efficient unikernel for cloud services

Language:C++License:Apache-2.0Stargazers:0Issues:2Issues:0

IP2INT

Simple Matlab Functions that reads an xlsx and converts IP addresses to INT or DOUBLE

Language:MATLABStargazers:0Issues:2Issues:0

knockknock

Who's there?

Language:PythonLicense:NOASSERTIONStargazers:0Issues:2Issues:0

machine-learning-SIEM-water-infrastructure

This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.

Language:PythonLicense:Apache-2.0Stargazers:0Issues:2Issues:0

mandelbrot

Basic Mandelbrot set in Python

Language:PythonStargazers:0Issues:2Issues:0

mlAndSecurity

Application of machine learning for security

Language:JavaScriptStargazers:0Issues:2Issues:0

netcat-sensor

simple netcat script to generate sensor data

Language:ShellStargazers:0Issues:2Issues:0

network-threats-taxonomy

Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies "A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets” and “A Taxonomy of Malicious Traffic for Intrusion Detection Systems”, classifying threats as well as evaluating current datasets. The result shows that a large portion of current research published train IDS algorithms against outdated datasets and outdated threats. To this end, we provide the source of our threat taxonomy, allowing other researchers to contribute and modify it.

Language:TeXLicense:GPL-3.0Stargazers:0Issues:2Issues:0

OS-X-Security-and-Privacy-Guide

A practical guide to securing OS X

Language:PythonLicense:MITStargazers:0Issues:2Issues:0

patoolkit

PA Toolkit is a collection of traffic analysis plugins focused on security

Language:LuaStargazers:0Issues:2Issues:0

Perfect-hashing-based-PFAC-on-GPUs

The implementation of perfect hashing based parallel failureless Aho-Corasick algorithm on Graphic Processing Units

Language:CStargazers:0Issues:2Issues:0

pyenv

Simple Python version management

Language:ShellLicense:MITStargazers:0Issues:1Issues:0

ultimate-beamer-theme-list

A collection of custom Beamer themes

Stargazers:0Issues:2Issues:0