A very vulnerable online chat application
-
Updated
Apr 1, 2019 - Java
A very vulnerable online chat application
Password security auditing tool for login over HTTP GET or HTTP Basic Authentication.
HACKING TOOLS
Terraform module of an active-passive FortiGate Azure NVA cluster.
Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis (OSDI '18) implementation focused on composability
Some algorithm of network cryptography
This is a symmetric key cryptography algorithm where the plain text is encrypted using a private key and resizer parameter taken as input from the user. The encryption technique uses genetic algorithm and mathematical operations. Level of complexity of encryption and the size of the final cipher text can be regulated using the resizer parameter.
VoltSec.io Network Protection is a project aimed at providing network security and firewall functionalities to protect your network from unauthorized access and malicious activities.
Strengthen your cybersecurity defenses with proactive risk identification and mitigation. Explore our guide for deploying Nessus effectively in a virtualized setup.
Implementation of Cryptography and Network Security Algorithms
Bulk WHOIS Search
The Assignments of Data and Network Security course at La Sapienza
Artemis Network Traffic Virus Monitor - Distributed Deployment Edition
This is a research project which discusses Privacy Issues in IOT and proposed solution to it. In this project, we proposed a suitable wireless security mechanism for the hospital.
Cryptography and Network Security labsets
Inserts iptables rules prior to logging rules
Add a description, image, and links to the network-security topic page so that developers can more easily learn about it.
To associate your repository with the network-security topic, visit your repo's landing page and select "manage topics."