A web app that makes it easier to test data loss prevention software.
-
Updated
Apr 28, 2015 - HTML
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
A web app that makes it easier to test data loss prevention software.
Data forensic tool
University(SevGU) projects. Several encryption algorithms implementations
Microsoft Office Dictionary of Security Teams
A toolkit for performing different functions on IPs
A lab illustrating how you can create a cheap and easy laser microphone for audio surveillance.
A secure instant messaging system 💬 that can authenticate with the Portuguese Citizen Card 💳
A lab illustrating how some basic wifi hacking tools work.
A lab covering Penetration Testing Drop Boxes.
Modified version of scan.bro to add destination IP sampling
An introductory lab to IOT device security.
Open Source Intelligence
Program system to protect information/Программная система для защиты информации
Common encryption algorithms on python
This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.
Implementation of concepts and algorithms from various disciplines of computer science.
This is collection of Visual Studio projects created using C# langauge. Projects include different concepts of animation and transitions, security and different encryption methods. These includes alternative ideas which includes various considerably innovative ideas if you don't want to use regular security methods.
InfoSec Training, Community, and Competition
Created by The cybersecurity community