🐧🔥System security testing tools(compatible with Debian/Centos/Ubuntu/Kali/Mint,use the nmap and hydra security testing tools)
-
Updated
Jul 18, 2021 - Shell
🐧🔥System security testing tools(compatible with Debian/Centos/Ubuntu/Kali/Mint,use the nmap and hydra security testing tools)
Penguin OS Forensic (or Flight) Recorder
Evading Provenance-Based ML Detectors with Adversarial System Actions
A Windows CIS benchmark policy compliance auditor
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] SEMESTER VI
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Using domain name on IPtables. Keep updated firewall rules from dynamic DNS (DDNS).
Resources for the Cybersecurity Bootcamp.
🔒 🔑 👮♂️ Pasword Hashing based on System.Security.Cryptography and OBVIEX
Securinator will streamline Network Administrationby saving time issuing commands by outputing time consuming commands to a TXT file and then displaying the results in a Command Prompt to avoid having to use long commands repededly. Securinator is good for compairing system and file properties aswell as seeking seeking out malware manually and …
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
This is a complete guide to securing your AWS servers for algorihtmic trading.
These are just random experiments and practical programs written by me during college.
Intrusion Detection in Computer Systems using Machine Learning Models.
A repository to hold code for security related examples
Usermode rootkit scanner written in C x86 + x86_64
Some Shell Scripts for System Exploitation
Add a description, image, and links to the system-security topic page so that developers can more easily learn about it.
To associate your repository with the system-security topic, visit your repo's landing page and select "manage topics."