There are 1 repository under system-security topic.
:penguin::fire:System security testing tools(compatible with Debian/Centos/Ubuntu/Kali/Mint,use the nmap and hydra security testing tools)
Penguin OS Forensic (or Flight) Recorder
Evading Provenance-Based ML Detectors with Adversarial System Actions
A Windows CIS benchmark policy compliance auditor
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] SEMESTER VI
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Using domain name on IPtables. Keep updated firewall rules from dynamic DNS (DDNS).
:lock: :key: :policeman: Pasword Hashing based on System.Security.Cryptography and OBVIEX
Resources for the Cybersecurity Bootcamp.
Usermode rootkit scanner written in C x86 + x86_64
A world UI to fix capitalism by putting Demand in front of Supply. People dynamically input what they would buy with $150K salary, and then we reverse-engineer and align work and resources to make what we want.
This is a complete guide to securing your AWS servers for algorihtmic trading.
Securinator will streamline Network Administrationby saving time issuing commands by outputing time consuming commands to a TXT file and then displaying the results in a Command Prompt to avoid having to use long commands repededly. Securinator is good for compairing system and file properties aswell as seeking seeking out malware manually and keeping track of network activitey. I Hope you love it! Thanks
Implementation of all the basic Cryptogaphy algorithms and detailed procedure of Attacks.
A repository to hold code for security related examples
ini merupakan repository kumpulan kode sumber (source code) yang digunakan untuk melakukan pengenalan wajah (facerecognition) dengan menggunakan pustaka OpenCV
Some Shell Scripts for System Exploitation
Seminar paper for class Security of Information Systems on subject "Managed Security Service Providers".
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
Intrusion Detection in Computer Systems using Machine Learning Models.
These are just random experiments and practical programs written by me during college.