-
Updated
May 29, 2020
#
computer-security
Here are 71 public repositories matching this topic...
Respounder detects presence of responder in the network.
golang
hackers
responder
network-security-monitoring
attack-prevention
llmnr
computer-security
network-security
attack-defense
blue-team
-
Updated
Jun 15, 2019 - Go
-
Updated
May 17, 2020
-
Updated
May 15, 2020
This repository contains resources to get you started in the field of your choice.
android
computer-science
open-source
machine-learning
web-development
hardware
competitive-programming
getting-started
graphic-design
computer-security
cyberlabs
-
Updated
Mar 7, 2020
security
cryptography
rsa
md5
playfair
rc4
hill-cipher
diffie-hellman
encryption-algorithms
railfence
computer-security
caesar-cipher
vigenere-cipher
decryption-algorithm
rsa-encryption
diffie-hellman-algorithm
rsa-algorithm
monoalphabetic
counteributors
columnar
-
Updated
Aug 10, 2018 - C#
-
Updated
Nov 15, 2017 - TeX
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
-
Updated
Oct 11, 2017 - C++
TriFlow: Triaging Android Applications using Speculative Information Flows
-
Updated
Mar 29, 2020 - Python
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
security
cryptography
crypto
encryption
cryptanalysis
aes
brute-force
infosec
aes-encryption
information-security
crack
computer-security
-
Updated
Nov 21, 2018 - Python
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
nodejs-script
dictionary-attack
cyberoam
computer-security
ethical-hacking
nit-kurukshetra
user-portal
-
Updated
May 29, 2017 - JavaScript
Upsolving is the KEY ! Documentation for everything related to past CTF participations.
-
Updated
Mar 30, 2020
[Archived] Analysis of the potential impact of IDN Homograph Attacks
-
Updated
Jun 16, 2017 - Go
Course material for a course on Computer Security
-
Updated
Mar 19, 2020 - TeX
Centralized Command&Control botnet. Coursework in Computer Security 2015/2016.
-
Updated
Jul 25, 2017 - Java
My collection of awesome resources, tools, and other shiny things for cyber security stuffs. 😎 😈
-
Updated
Aug 31, 2018
LaTeX Bibliography for Research Papers on Security and Privacy
cryptography
distributed-computing
cryptocurrencies
computer-security
privacy-enhancing-technologies
-
Updated
Nov 8, 2018 - TeX
An Ida plugin that does static analysis to describe what malware is doing.
security
ida-pro
malware-analysis
ida-plugin
computer-security
abstract-syntax-tree
idapython-plugin
-
Updated
Jul 21, 2019 - Python
Built in a machine learning hackathon organised by National Stock Exchange, Mumbai, India
python
machine-learning
deep-learning
pca-analysis
computer-security
lstm-neural-networks
security-automation
k-means-clustering
-
Updated
Mar 21, 2018 - Jupyter Notebook
Malware detection using N-Gram and machine learning.
-
Updated
Jun 9, 2018 - HTML
A dockerized Capture The Flag challenge for computer science students. Get to know the basics !
-
Updated
Jul 23, 2019 - PHP
Cryptography Algorithm Implementations
java
cryptography
hill-cipher
frequency-analysis
computer-security
shift-cipher
vigenere-cipher
substitution-cipher
affine-cipher
index-of-coincidence
classical-cryptography
autokey-cipher
lsfr-cipher
permutation-cipher
scytale-cipher
kasiski-test
-
Updated
Sep 26, 2018 - Java
This Repository for studying the Last year of IS in Mansoura University Containing {Courses , Projects , Modules , Deadlines}
android
python
data-mining
compression
multimedia
jupyter-notebook
python3
project-management
distributed-database
asp-net-core
geographical-information-system
dss
computer-security
business-process-management
mobile-computing
deadlines
modeling-and-simulation
selected-topics
mansoura-university
-
Updated
May 25, 2020 - Jupyter Notebook
An ida pro plugin that tracks def use chains of a given x86 binary.
security
ida-pro
malware-analysis
ida-plugin
computer-security
abstract-syntax-tree
idapython-plugin
use-define-chain
-
Updated
Jul 21, 2019 - Python
A WinForm application for hiding text messages in images, and extracting messages from images with hidden content
-
Updated
Aug 5, 2017 - C#
Project made for the Network and Computer Security Course
-
Updated
May 6, 2017 - Java
Return-to-libc buffer overflow attack.
-
Updated
Nov 23, 2018 - C
Covert channel - attributes / Скрытый канал передачи по атрибутам
-
Updated
Sep 12, 2017 - Python
Improve this page
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."

