This Repository is a collection of different Ethical Hacking Tools written in python, ruby, rust, c++, go and c.
-
Updated
May 28, 2024 - C
This Repository is a collection of different Ethical Hacking Tools written in python, ruby, rust, c++, go and c.
(MobiSys-24 Poster) BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
This is the implement of the Chacha20 algorithm that applies actual real-time encryption on user input data/texts
A collection of CTF challenges I developed.
Lectures: Computer Programming 2 | OOP | GUI Programming | Data Structures | Algorithms | Cyber Security | System Analysis and Design
Ceaser cipher based encrypton/decryption code for beginners.
THAMARA - Threat Hunting with AMSI and YARA
Лабораторные работы по курсу учебной дисциплины «Безопасность операционных систем»
My public notes about offensive security
👻 SYSTEMatic: Systematically Seizing SYSTEM Rights. Token Impersonation POC. Alternative to PSExec for token theft. From Administrator to NT Authority\SYSTEM.
This repository contains resources to learn and practice report writing for Capture The Flag (CTF) and/or Penetration Testing challenges.
Firmware Unleashed para Flipper Zero
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Image Encryption and Decryption with RSA, Blowfish, and other algorithms
Program examples utilizing the DPDK. The DPDK is a kernel-bypass network library that allows for very fast network packet processing. This is great for (D)DoS mitigation and low-latency packet inspection, manipulation, and forwarding.
This is an assignment I completed as an undergraduate student in Technical University of Crete.
A repository that includes common helper functions for writing applications in the DPDK. I will be using this for my future projects in the DPDK.
Hayden Housen's solutions to the 2021 PicoCTF Competition
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."