There are 0 repository under amrita topic.
19CSE100 - Problem Solving and Algorithmic Thinking (PSAT) - 1st Sem - B.E. (CSE-CYS) - ASC, CBE.
The must-have app for an Amritian.
Blockchain Activities of Amrita TIFAC Cyber
19CSE464 - Fundamentals of Software Engineering - 6th Sem - B.E. (CCE) - ASE, CBE
Cyber Security (CYS) - Research Analysis and Metrics (RAM)
Official source code of AYKYA Amrita Bengaluru website
Amrita Links GAK - For Amritians - A quick access point for all your Academic Needs
Official source code of FACE Amrita Bengaluru website and it's sister chapters
This repo is the official repository for Amrita events (Eventide) Android App.
Code for Aarohan Registration 2018 (10th edition of Aarohan)
Official Website for the 9th edition of Stay Late And Code - SLAC 2019. Sponsored by GitHub, CSI and Amrita Vishwa Vidyapeetham and organised by FACE - Forum For Aspiring Computer Engineers
19CSE201 - Advanced Programming - 3rd Sem - B.E. CSE(CYS) - ASE, CBE
Amrita Blockchain Certifications
Official source code of ECCIF Amrita Bangalore website
Code from Software Engineering Lab project at Amrita School of Engineering, Bengaluru. Made as per use cases and requirements given by Tata Consultancy Services Limited on November 2017
Official source code of SPIC MACAY Amrita Bangalore website
Official Website for the 11th edition of Stay Late and Code - SLAC 2020. Organised by FACE - Forum for Aspiring Computer Engineers
Official Website for the 10th edition of Stay Late and Code - SLAC 2020. Organised by FACE - Forum for Aspiring Computer Engineers
My Gurus
Project Details of B.Tech Computer Science and Engineering (Cyber Security) Projects
Project Details of M.Tech Cyber Security Projects
This experiment belongs to Introductory Cyber Security Lab Amrita. Name: Experiment to test broken authentication using cookie manipulation to gain unauthorized access to the admin dashboard
This experiment belongs to Introductory Cyber Security Lab Amrita. Name: Experiment to understand how cross-site scripting vulnerabilities can be exploited
This experiment belongs to Introductory Computer Forensics Lab Amrita. Full Name: Experiment on data hiding and unhiding: LSB technique
This experiment belongs to Introductory Computer Forensics Lab Amrita. Full Name: Detecting TOR Browser on a Machine
This experiment belongs to Introductory Computer Forensics Lab Amrita. Full Name: Experiment to understand File signatures and use them for File carving
This experiment belongs to Introductory Computer Forensics Lab Amrita. Full Name: Experiment to perform a forensic investigation on email
This experiment belongs to Introductory Cyber Security Lab Amrita. Name: Experiment to understand the libraries a malicious binary uses to figure out its functionality and then to figure out the exact domain/IP it connects to
This experiment belongs to Introductory Cyber Security Lab Amrita. Name: Experiment to identify malicious traffic from benign normal traffic using network logs
This experiment belongs to Introductory Computer Forensics Lab Amrita. Full Name:Experiments on Master File Table
This experiment belongs to Introductory Computer Forensics Lab Amrita. Full Name:Experiment on Memory forensics: Retrieving password hashes and dumping cached files from memory dumps
This experiment belongs to Introductory Cyber Security Lab Amrita. Name: Experiment to understand OS command injection due to improper sanitization of user inputs
This experiment belongs to Introductory Computer Forensics Lab Amrita. Full Name:Understanding Distortion Steganography
This experiment belongs to Introductory Computer Forensics Lab Amrita. Full Name: Identifying and Investigating Various Network Attacks using Wireshark