Information Security and Privacy Assignment at NYU
-
Updated
Jun 12, 2018 - Jupyter Notebook
Information Security and Privacy Assignment at NYU
A collection of resources to help women get into the cyber security industry
A tools for mathematical caculation such as greatest common factor, primitive roots, primality test .etc
This is the repor where I have published all my Conference Talks Slids on Information Security
Common (and Advanced) Information Security Questions. Questions you should know the answer to for your information security career.
List of various ethical hacking tools
All things Cybersecurity!
Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more
lightweight http redirector written in nim
Tools & Cases
Shade_hunt is an open-source Node.js brute force tool designed to test the security and authentication of systems. With a minimalistic and highly customizable interface, it allows for testing different types of authentication, from simple passwords to API keys and access tokens.
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Writeups from HTB, THM, and various CTFs.
Offensive Security Research, Corporate Espionage Investigation
A secure and user-friendly password encryption and decryption tool, leveraging advanced cryptography for reliable password management.
OWASP Honeypot, Automated Deception Framework.
TOR VPN - USE TOR LIKE VPN
VulNyx is a website that contains a list of vulnerable machines that are Unix based.
A Blazing fast Security Auditing tool for Kubernetes
Add a description, image, and links to the informationsecurity topic page so that developers can more easily learn about it.
To associate your repository with the informationsecurity topic, visit your repo's landing page and select "manage topics."