A complete flow for purchase of items for railways, their inspection and approval by Chief Electrical Engineer.
-
Updated
Aug 29, 2018 - JavaScript
A complete flow for purchase of items for railways, their inspection and approval by Chief Electrical Engineer.
This java source code computes the MD5 message digest.
Linux Yaz Kampı 2016 - Ağ Güvenliği ve Denetimi Kurs Notları
This repository shows all the hands on experience on Palo Alto Firewall, assignment and projects I have done in My Palo Alto Specialization Journey.
Contains many network security projects built on Cisco lab equipment. Each project will feature a topology diagram and description, a step by step intentional attack on the network and a step by step mitigation process.
Real world application of Manipulating Excel Sheet using python.
YARA rule-based automation system to detect network attacks at byte-level
This network design is only meant for a small scale organisation (Micky Bank) where the access point could support approximately 200 users. The extra or unused port either on layer 2 or 3 switch could be reserved for further use especially when there is a need of expanding the network usage.
Machine Learning based Intrusion Detection System
ARP Cache Poisioning Tool written in Python☣️
Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.
Here I created python scripts to generate the encrypted hash.
Weather Analyzer Script Using Python request module. OpenWeatherMap API is used to fetch data.
CobaltStrike and Google Auth twice
Horsing around with golang net and crypto package and transport security
This repository has customised scripts of Zeek IDS.
The project about a network security system that utilizes cryptography techniques to ensure secure communication between network nodes. This system will provide encryption, decryption, and authentication mechanisms to protect sensitive data transmitted over the network
CYBER SECURITY ESSENTIALS
Add a description, image, and links to the networksecurity topic page so that developers can more easily learn about it.
To associate your repository with the networksecurity topic, visit your repo's landing page and select "manage topics."