-
Updated
Jul 4, 2021
#
computer-security
Here are 96 public repositories matching this topic...
A collection of awesome security hardening guides, tools and other resources
security
best-practices
cybersecurity
infosec
awesome-list
security-hardening
cyber-security
computer-security
blueteam
security-tools
blue-team
linux-hardening
cis-benchmarks
windows-hardening
-
Updated
Jun 29, 2021
Respounder detects presence of responder in the network.
golang
hackers
responder
network-security-monitoring
attack-prevention
llmnr
computer-security
network-security
attack-defense
blue-team
-
Updated
Jun 15, 2019 - Go
-
Updated
Mar 14, 2021
-
Updated
Mar 27, 2021
This repository contains resources to get you started in the field of your choice.
android
computer-science
open-source
machine-learning
web-development
hardware
competitive-programming
getting-started
graphic-design
computer-security
cyberlabs
-
Updated
Dec 30, 2020
security
cryptography
rsa
md5
playfair
rc4
hill-cipher
diffie-hellman
encryption-algorithms
railfence
computer-security
caesar-cipher
vigenere-cipher
decryption-algorithm
rsa-encryption
diffie-hellman-algorithm
rsa-algorithm
monoalphabetic
counteributors
columnar
-
Updated
Apr 22, 2021 - C#
-
Updated
Jun 20, 2020 - TeX
All the homeworks, studies and projects I've done at Metu-CENG
python
c
java
haskell
opengl
networking
cpp
signal-processing
computer-graphics
prolog
embedded-systems
programming-languages
coursework
operating-systems
formal-languages
computer-security
computer-organization
logic-design
metu-ceng
metu
-
Updated
Feb 7, 2021 - Jupyter Notebook
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
security
cryptography
crypto
encryption
cryptanalysis
aes
brute-force
infosec
aes-encryption
information-security
crack
computer-security
-
Updated
Nov 21, 2018 - Python
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
-
Updated
Oct 11, 2017 - C++
TriFlow: Triaging Android Applications using Speculative Information Flows
-
Updated
Jun 2, 2021 - Python
-
Updated
Feb 20, 2020
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
nodejs-script
dictionary-attack
cyberoam
computer-security
ethical-hacking
nit-kurukshetra
user-portal
-
Updated
May 29, 2017 - JavaScript
Make your customized wordlist for penetration testing practice (brute force attack, dictionary attack, etc.)
dictionary
wordlist
cybersecurity
penetration-testing
dictionary-tools
cracking
dictionary-attack
information-security
wordlist-generator
rainbow-table
computer-security
ethical-hacking
pentest-tool
wordlist-technique
hacking-tools
wordlist-processing
wordlist-generator-gui
customized-wordlists
penetration-testing-tools
wordlist-attack
-
Updated
Oct 30, 2020 - C
[Archived] Analysis of the potential impact of IDN Homograph Attacks
-
Updated
Jun 16, 2017 - Go
My collection of awesome resources, tools, and other shiny things for cyber security stuffs. 😎 😈
-
Updated
Aug 31, 2018
Upsolving is the KEY ! Documentation for everything related to past CTF participations.
-
Updated
Aug 29, 2020
Suricata config to apply IDPS mode on Ubuntu 18.04 LTS
suricata
ids
ubuntu-server
nsm
ips
nids
computer-security
nips
network-security
intrusion-detection-system
nmap-scan-script
ubuntu1804
hping3
dos-attack
intrusion-prevention-system
suricata-rules
metasploit-modules
elf-executable
af-packet
-
Updated
Mar 14, 2020
Course material for a course on Computer Security
-
Updated
Mar 19, 2020 - TeX
Centralized Command&Control botnet. Coursework in Computer Security 2015/2016.
-
Updated
Jul 25, 2017 - Java
python Codes for decrypting caesar cipher
-
Updated
Jun 2, 2021 - Python
Courses and projects developed in the Bachelor in Computer Science program at UNI (National University of Engineering).
statistics
opengl
computer-vision
compiler
algorithms
computer-graphics
genetic-algorithm
openmp
mpi
parallel-computing
distributed-computing
databases
data-structures
concurrent-programming
software-engineering
computer-architecture
computer-security
numerical-analysis
simulation-modeling
computer-networks
-
Updated
Feb 18, 2021 - C
LaTeX Bibliography for Research Papers on Security and Privacy
cryptography
distributed-computing
cryptocurrencies
computer-security
privacy-enhancing-technologies
-
Updated
Oct 29, 2020 - TeX
Cryptography Algorithm Implementations
java
cryptography
hill-cipher
frequency-analysis
computer-security
shift-cipher
vigenere-cipher
substitution-cipher
affine-cipher
index-of-coincidence
classical-cryptography
autokey-cipher
lsfr-cipher
permutation-cipher
scytale-cipher
kasiski-test
-
Updated
Sep 26, 2018 - Java
keylogger for Windows developed in C ++ as part of an ethical hacking course
c-plus-plus
hacking
windows-10
keylogger
whitehat
hacking-tool
computer-security
microsoft-windows
ethicalhacking
-
Updated
Aug 8, 2019 - C++
Built in a machine learning hackathon organised by National Stock Exchange, Mumbai, India
python
machine-learning
deep-learning
pca-analysis
computer-security
lstm-neural-networks
security-automation
k-means-clustering
-
Updated
Mar 21, 2018 - Jupyter Notebook
Improve this page
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."