-
Updated
Aug 14, 2020
#
computer-security
Here are 74 public repositories matching this topic...
Respounder detects presence of responder in the network.
golang
hackers
responder
network-security-monitoring
attack-prevention
llmnr
computer-security
network-security
attack-defense
blue-team
-
Updated
Jun 15, 2019 - Go
-
Updated
Aug 8, 2020
-
Updated
Aug 23, 2020
This repository contains resources to get you started in the field of your choice.
android
computer-science
open-source
machine-learning
web-development
hardware
competitive-programming
getting-started
graphic-design
computer-security
cyberlabs
-
Updated
Mar 7, 2020
security
cryptography
rsa
md5
playfair
rc4
hill-cipher
diffie-hellman
encryption-algorithms
railfence
computer-security
caesar-cipher
vigenere-cipher
decryption-algorithm
rsa-encryption
diffie-hellman-algorithm
rsa-algorithm
monoalphabetic
counteributors
columnar
-
Updated
Aug 10, 2018 - C#
-
Updated
Jun 20, 2020 - TeX
All the homeworks, studies and projects I've done at Metu-CENG
javascript
python
c
java
haskell
opengl
networking
cpp
signal-processing
computer-graphics
prolog
embedded-systems
coursework
operating-systems
formal-languages
computer-security
computer-organization
logic-design
metu-ceng
metu
-
Updated
Jul 26, 2020 - Jupyter Notebook
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
-
Updated
Oct 11, 2017 - C++
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
security
cryptography
crypto
encryption
cryptanalysis
aes
brute-force
infosec
aes-encryption
information-security
crack
computer-security
-
Updated
Nov 21, 2018 - Python
TriFlow: Triaging Android Applications using Speculative Information Flows
-
Updated
Mar 29, 2020 - Python
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
nodejs-script
dictionary-attack
cyberoam
computer-security
ethical-hacking
nit-kurukshetra
user-portal
-
Updated
May 29, 2017 - JavaScript
Upsolving is the KEY ! Documentation for everything related to past CTF participations.
-
Updated
Aug 29, 2020
[Archived] Analysis of the potential impact of IDN Homograph Attacks
-
Updated
Jun 16, 2017 - Go
Centralized Command&Control botnet. Coursework in Computer Security 2015/2016.
-
Updated
Jul 25, 2017 - Java
Course material for a course on Computer Security
-
Updated
Mar 19, 2020 - TeX
My collection of awesome resources, tools, and other shiny things for cyber security stuffs. 😎 😈
-
Updated
Aug 31, 2018
LaTeX Bibliography for Research Papers on Security and Privacy
cryptography
distributed-computing
cryptocurrencies
computer-security
privacy-enhancing-technologies
-
Updated
Nov 8, 2018 - TeX
An Ida plugin that does static analysis to describe what malware is doing.
security
ida-pro
malware-analysis
ida-plugin
computer-security
abstract-syntax-tree
idapython-plugin
-
Updated
Jul 21, 2019 - Python
Built in a machine learning hackathon organised by National Stock Exchange, Mumbai, India
python
machine-learning
deep-learning
pca-analysis
computer-security
lstm-neural-networks
security-automation
k-means-clustering
-
Updated
Mar 21, 2018 - Jupyter Notebook
Network security project that investigates the on-path "Great Firewall of China"
-
Updated
Jan 12, 2018 - Python
Malware detection using N-Gram and machine learning.
-
Updated
Jun 9, 2018 - HTML
A dockerized Capture The Flag challenge for computer science students. Get to know the basics !
-
Updated
Jul 23, 2019 - PHP
Exploiting the vulnerabilities
-
Updated
Dec 5, 2019 - C
Courses and projects developed in the Bachelor in Computer Science program at UNI (National University of Engineering).
statistics
opengl
computer-vision
compiler
algorithms
computer-graphics
genetic-algorithm
openmp
mpi
parallel-computing
distributed-computing
databases
data-structures
concurrent-programming
software-engineering
computer-architecture
computer-security
numerical-analysis
simulation-modeling
computer-networks
-
Updated
May 11, 2020 - C
Cryptography Algorithm Implementations
java
cryptography
hill-cipher
frequency-analysis
computer-security
shift-cipher
vigenere-cipher
substitution-cipher
affine-cipher
index-of-coincidence
classical-cryptography
autokey-cipher
lsfr-cipher
permutation-cipher
scytale-cipher
kasiski-test
-
Updated
Sep 26, 2018 - Java
keylogger for Windows developed in C ++ as part of an ethical hacking course
c-plus-plus
hacking
windows-10
keylogger
whitehat
hacking-tool
computer-security
microsoft-windows
ethicalhacking
-
Updated
Aug 8, 2019 - C++
This Repository for studying the Last year of IS in Mansoura University Containing {Courses , Projects , Modules , Deadlines}
android
python
data-mining
compression
multimedia
jupyter-notebook
python3
project-management
distributed-database
asp-net-core
geographical-information-system
dss
computer-security
business-process-management
mobile-computing
deadlines
modeling-and-simulation
selected-topics
mansoura-university
-
Updated
Jul 30, 2020 - Jupyter Notebook
Improve this page
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."