-
Updated
May 16, 2022
#
computer-security
Here are 112 public repositories matching this topic...
A collection of awesome security hardening guides, tools and other resources
security
best-practices
cybersecurity
infosec
awesome-list
security-hardening
cyber-security
computer-security
blueteam
security-tools
blue-team
linux-hardening
cis-benchmarks
windows-hardening
-
Updated
Jun 29, 2022
Respounder detects presence of responder in the network.
golang
hackers
responder
network-security-monitoring
attack-prevention
llmnr
computer-security
network-security
attack-defense
blue-team
-
Updated
Jun 15, 2019 - Go
-
Updated
Mar 14, 2021
-
Updated
Feb 11, 2022
This repository contains resources to get you started in the field of your choice.
android
computer-science
open-source
machine-learning
web-development
hardware
competitive-programming
getting-started
graphic-design
computer-security
cyberlabs
-
Updated
Dec 30, 2020
security
cryptography
rsa
md5
playfair
rc4
hill-cipher
diffie-hellman
encryption-algorithms
railfence
computer-security
caesar-cipher
vigenere-cipher
decryption-algorithm
rsa-encryption
diffie-hellman-algorithm
rsa-algorithm
monoalphabetic
counteributors
columnar
-
Updated
Apr 22, 2021 - C#
All the homeworks, studies and projects I've done at Metu-CENG
python
c
java
haskell
opengl
networking
cpp
signal-processing
computer-graphics
prolog
embedded-systems
programming-languages
coursework
operating-systems
formal-languages
computer-security
computer-organization
logic-design
metu-ceng
metu
-
Updated
Jan 2, 2022 - Jupyter Notebook
-
Updated
Jun 20, 2020 - TeX
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
security
cryptography
crypto
encryption
cryptanalysis
aes
brute-force
infosec
aes-encryption
information-security
crack
computer-security
-
Updated
Nov 21, 2018 - Python
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
-
Updated
Oct 11, 2017 - C++
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.).
dictionary
wordlist
cybersecurity
penetration-testing
dictionary-tools
cracking
dictionary-attack
information-security
wordlist-generator
rainbow-table
computer-security
ethical-hacking
pentest-tool
wordlist-technique
hacking-tools
wordlist-processing
wordlist-generator-gui
customized-wordlists
penetration-testing-tools
wordlist-attack
-
Updated
Feb 6, 2022 - C
-
Updated
Feb 20, 2020
TriFlow: Triaging Android Applications using Speculative Information Flows
-
Updated
Jun 2, 2021 - Python
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
nodejs-script
dictionary-attack
cyberoam
computer-security
ethical-hacking
nit-kurukshetra
user-portal
-
Updated
May 29, 2017 - JavaScript
[Archived] Analysis of the potential impact of IDN Homograph Attacks
-
Updated
Jun 16, 2017 - Go
My collection of awesome resources, tools, and other shiny things for cyber security stuffs. 😎 😈
-
Updated
Aug 31, 2018
Upsolving is the KEY ! Documentation for everything related to past CTF participations.
-
Updated
Aug 29, 2020
Suricata config to apply IDPS mode on Ubuntu 18.04 LTS
suricata
ids
ubuntu-server
nsm
ips
nids
computer-security
nips
network-security
intrusion-detection-system
nmap-scan-script
ubuntu1804
hping3
dos-attack
intrusion-prevention-system
suricata-rules
metasploit-modules
elf-executable
af-packet
-
Updated
Feb 12, 2022
Centralized Command&Control botnet. Coursework in Computer Security 2015/2016.
-
Updated
Jul 25, 2017 - Java
Course material for a course on Computer Security
-
Updated
Mar 19, 2020 - TeX
Courses and projects developed in the Bachelor in Computer Science program at UNI (National University of Engineering).
statistics
opengl
computer-vision
compiler
algorithms
computer-graphics
genetic-algorithm
openmp
mpi
parallel-computing
distributed-computing
databases
data-structures
concurrent-programming
software-engineering
computer-architecture
computer-security
numerical-analysis
simulation-modeling
computer-networks
-
Updated
Aug 17, 2021 - C
Esperimenti e progetti realizzati durante il corso di Computer Security 2021/2021
-
Updated
Jun 27, 2022 - TeX
LaTeX Bibliography for Research Papers on Security and Privacy
cryptography
distributed-computing
cryptocurrencies
computer-security
privacy-enhancing-technologies
-
Updated
Oct 29, 2020 - TeX
Cryptography Algorithm Implementations
java
cryptography
hill-cipher
frequency-analysis
computer-security
shift-cipher
vigenere-cipher
substitution-cipher
affine-cipher
index-of-coincidence
classical-cryptography
autokey-cipher
lsfr-cipher
permutation-cipher
scytale-cipher
kasiski-test
-
Updated
Sep 26, 2018 - Java
A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science students in Cybersecurity
computer-science
cybersecurity
computer-architecture
computer-security
frameworks
security-tools
cyberweapon
practice-programming
computer-science-students
cyber-threat-intelligence
computer-science-and-engineering
computer-science-project
-
Updated
Mar 6, 2022
security
typing
biometrics
keystrokes
computer-security
biometric
keystroke-biometrics-identification
-
Updated
Oct 30, 2020 - Python
Improve this page
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."