Macro-header for compile-time C obfuscation (tcc, win x86/x64)
-
Updated
Jul 27, 2024 - C
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Code Portfolio -- Collection of Interesting CS and ECE Projects in different languages (C, C++, Python, CPU & GPU Parallel Paradigms, MATLAB, and VHDL) and target hardware with technical reports, and my Vim Config
Decompile, optimize, recompile, and integrate spyware and remote control features into APK and EXE files with LurkerX, the ultimate tool for security researchers, penetration testers, and ethical hackers.
Лабораторные работы по курсу учебной дисциплины «Безопасность операционных систем»
A Subject wise collection of codes made during my graduation
List of NTNU, NTU, NTUST courses that I learned.
Hybrid encryption scheme using AES and DES
THAMARA - Threat Hunting with AMSI and YARA
Generates a strong password up to 256 characters from ASCII .
Contains some lab work of Public key encryption, Man-In-The-Middle Attack, RSA Algorithm, Transport Layer Security.
CS2107 Introduction to Information Security @ NUS SoC
Algorithms & Codes related to Information Security
My random code for a bunch of random ideas I get out of my noggin.
This folder contains all course codes of 4th semester in IIT DU. The courses contain - DBMS, Information Security and Operating Systems.
Created by The cybersecurity community