MD✔️'s repositories
treebased-ids
This project is a live network monitoring dashboard that leverages tree-based machine learning algorithms to detect intrusions in real-time. The system uses Flask and Socket.IO for real-time data updates, and Chart.js for data visualization. The dashboard provides various charts to visualize network data and sends notifications for suspicious activ
Air-Quality-Nairobi
Air Quality in Nairobi (Based on PM2.5 index)- A Time Series Analysis Projects - Building ARIMA ML Model. In this project, I work with data from one of Africa’s largest open data platforms openAfrica https://africaopendata.org/ .I’ll look at air quality data from Nairobi, Lagos, and Dar es Salaam; and build a time seriesmodel to predict PM 2.5 readings throughout the day.
Housing-in-Mexico
In this project, I did work with a datasets with 21,000 properties for sale in Mexico through the real estate website Properati.com. My goal is to determine whether sale prices are influenced more by property size or location..
Real-State-in-Buenos-Aires
Predicting Housing Price Based on Area_m2, Latitude, Longitude, and Neighborhood in Buenos Aires (ML Project). In this project, I have emphasized on predictive data science. My focus is also real estate. I have walked through a procedural process of this project.
Bankruptcy-in-Poland
In this project, we’ll explore data collected by a team of Polish economists studying bankruptcy.I’ll work with financial data from the Emerging Markets Information Service. My goal is to build a model that can predict whether a company will go bankrupt or not.
Cryptography
Cryptography is an important tool for building secure systems. In this lab, you will explore how to build a file encryption service in Rust. We wish to allow a sender to securely communicate a file to a receiver. We do not assume the sender and receiver have communicated before, and therefore the two parties do not have some kind of shared secret b
Earthquake-Damage-Nepal
A Classification Model relies on Logistic Regression and Decision Tree Algorithm Has been build in this project to predict severity of Damage based on Earthquake Grade 0-5
makt96
About What I Am and What I Do
makt96.github.io
My Personal Website
mkadir
Portfolio site
pandaBanker-apiHooking
This repository contains a comprehensive analysis of the PandaBanker malware. The analysis includes examining various techniques employed by the malware such as API Hooking, Process Hijacking, and Memory Dumping. The investigation also involves practical steps using various tools to understand the malware's behavior and persistence mechanisms.
reverseEngineering-TeslaCryptRansomware
TeslaCrypt was a ransomware trojan that emerged in early 2015. It primarily targeted Windows systems and encrypted files, demanding a ransom payment in Bitcoin for the decryption key
simda-trajan-Analysis
The double layer packing mechanism in malware is an advanced obfuscation technique designed to evade detection by security software. This method involves wrapping the malicious code in two layers of encryption or compression. The first layer serves to unpack the second, more intricately concealed layer, which then decrypts or decompresses to reveal
toha
A Hugo theme for personal portfolio
voting_machine_sse
The goal of this project is to utilize the knowledge from the course to write a voting machine in Rust and embed backdoors inside of it that would allow a knowledgeable attacker to cheat in the election. Then, we would be given another team’s voting machine to attack, attempting to find all of the vulnerabilities (intentional or not) in their syste
unmapped_Emolet
This document outlines the comprehensive analysis conducted on the Emolet Trojan. The analysis process is divided into three main phases: Static Analysis, Debugging, and Memory Dumping and Unmapping.