There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Reconnaissance_Tools
A script on active scans and passive scans run to gather information on systems in the Cyber Kill Chain.Unitary-Transformations
Transformation made using the SVD algorithm for decomposition when U and V transpose are unitary and sigma is the diagonal matrixCMS-Exploit
An exploit for CMS in order to perform Remote Code Execution (RCE) through the design manager flaw in the systemLinux-Privilege-Escalation-Script
Performing Linux Privilege EscalationReverse-Shells
A reverse shell to establish a connection to a server through a client and vice versasecondsug-main
Stock-Predictor
Machine learning project to predict the sales for the next period of yearsAdvertising-
SSH
Passing SSH private keys into John the Ripper format for crackingReact-Nav
Machine-Learning-for-Security
AlgoTest
Basic-Scripting-Challenge
RSS
An application that maps to different URL's with a test to speech abilityThe-Hive
Analysis of captured network traffic after suspicion of data exfiltration on a network. The traffic corresponds to FTP connections that were established. IntroSecCon 2020 CTF challengeYARA-Test
A glance at malware analysis using Yara to identify and classify different types of malwareNeural-Network
Short code on how to create a neural network without tensor flow and kerasInventory-Management
Mobile Application that acts as an Inventory with POS and API'sGlass-classification
A django project using a machine learning model to determine what category of glass is being used basing on the materials it is composed ofICS
A cyber security framework housing key tools used to perform common attacks on systems, websites, and reconnaissance on companiesImage-Compression
Performing image compression using the singular value decomposition algorithm specifically implementing an economy SVD to compress the image. It also has a plot of singular values and the cumulative singular values on the energy used at different r nodes to compress the imageCapture-The-Flag---THM
A spectrogram is a visual representation of the spectrum of frequencies of a signal as it varies with time. When applied to an audio signal, spectrograms are sometimes called sonographs, voiceprints, or voicegrams. When the data is represented in a 3D plot they may be called waterfalls.Fuzzer
Buffer Overflow Exploitation Scripts that are customizable in Immunity Debugger and Putty, run alongside mona configurations to perform either stack-based, heap-based, or format string buffer attacks on computing memorySocket-Programming
Connecting multiple clients to a server using python3 sockets. It shows how to send messages from clients to servers and from servers to clients. Its also possible for one to host the socket locally or globally across the internet so that anyone can access it. It uses the python3 module and threading module.Love Open Source and this site? Check out how you can help us