Faisal A. Garba's repositories
python_dark_web
python_dark_web
ATI
Ixia ATI team open source or generally public material. Anything added here MUST be approved by Ixia Management.
Buffer_Overflow
Don't let buffer overflows overflow your mind
Canary
Argument Mining tool built in Python.
Collect-View---Contiki
Collect View for cooja Emulator
contikipy
Automated cooja simulations, log parsing, and plotting with python.
Data-Collector
This a project for IoT course of the polimi university. in this project we have to collect data from sensors
DDOS-RootSec
DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
dfrws2018-challenge
The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defined generally to include network and Internet connected devices usually for the purpose of monitoring and automation tasks. Consumer-grade “Smart” devices are increasing in popularity and scope. These devices and the data they collect are potentially interesting for digital investigations, but also come with a number of new investigation challenges.
fuzzy-logic-expert-system
An expert system based on fuzzy logic.
Fuzzy_Diabetes_Detection
Fuzzy Expert System for Diagnosis of Diabetes Mellitus
Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download)
HackTheKeyboard
A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your web server over HTTPS.
home-automation-contiki
Simulation of smart home automation system devices using contiki OS
HomeIoT
Home automation with Contiki-OS
IoT-Forensics
University of Nebraska Omaha - Capstone 2019 - IoT Forensics
IoT-project
IoT project based on Cooja simulations in Contiki and Californium
IoT_Defense_against_spoofing_attack
Wrote by: Dr. Yossi Oren, Mr. Kevin Sam Tharayil, Shani Houri, Shaked Eyal.
ketshash
A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.
LaZagne
Credentials recovery project
LINGI2146
LINGI2146 - Mobile and Embedded Computing
mobilityplugin
This plugin is used in contiki os with onos sdn-wise
PyRai
MIRAI botnet in python3
Python-3-For-Offensive-PenTest-A-Complete-Practical-Course
Python 3 For Offensive PenTest: A Complete Practical Course, published by Packt
Python-Prolog-Interpreter
A simple Prolog Interpreter written in a few lines of Python 3. It runs a limited subset of Prolog and uses backtracking and generators in order to perform its magic.
pythoncode-tutorials
The Python Code Tutorials
rpl-security-python
This is a controller in python without GUI, in order to communicate with cooja-contiki OS, via the serial port.
Ultimate-Dork
Web Crawler
waco
WaCo: A Wake-Up Radio COOJA Extension for Simulating Ultra Low Power Radios