Detect SSH connection attempts in real time using ptrace
-
Updated
Dec 23, 2015 - C
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Detect SSH connection attempts in real time using ptrace
SecurityTube Linux Assembly Expert (SLAE) repository.
Bluetooth support library written in C
Pico support library written in C
💢 Technical challenges and solutions for Cyberlytic's interview process
Ransomware model for Codebreaker 2018 walkthrough
Statically compiled binaries of Protostar (exploit-exercises.com) in ARM and MIPS along with original source code
A buffer overflow attack
Wrote by: Dr. Yossi Oren, Mr. Kevin Sam Tharayil, Shani Houri, Shaked Eyal.
Final project for Fundamentals of Cybersecurity
Prácticas de Seguridad en Sistemas Operativos de la especialidad Ingeniería del Software en la UGR.
Linux keylogger written in C
This project uses multi threading and socket programming to guarantee client-server sync in a cyber-Cafe
Set of solved cybersecurity challenges.
This repo hosts basic win32 compatible and visual studio C based shell code for an article on analysis
Development of active defense tools, made easier.
Created by The cybersecurity community