Skip to content
View arvindpj007's full-sized avatar

Block or report arvindpj007

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Fluffy Pancakes is a library designed to detect phishing websites.

Python 7 2 Updated Jun 22, 2022

Vehicular heatstroke, hyperthermia. The devastating effects of a child being left in a hot car. It's every parent's unfathomable nightmare, yet it happens several times a year. This is a project th…

Python 6 Updated Mar 30, 2020

A python based chat-bot based on deep seq2seq model trained to talk and interact like a friend. The system uses a encoder-decoder architecture with each block being a LSTM model. The models were tr…

Python 2 Updated Apr 26, 2020

Python program to recognise faces and smiles

Python 1 Updated Dec 6, 2017
Java 1 Updated Dec 17, 2017

The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project ill…

7 1 Updated Mar 30, 2020

Golang programs for AES -CBC mode encryption with HMAC-SHA256 and Padding Oracle attack on AES-CBC mode.

Go 12 2 Updated Apr 3, 2020

The repository contains configuring various network components and application of its associated security in it.

3 Updated Aug 6, 2020

Threat modeling of an open-source VPN Client - OpenConnect using Microsoft Threat Modeling Tool

4 1 Updated Apr 12, 2020

The task was to reverse engineer an open-source software and a custom binary using various diagnostic tools and security assessment techniques.

5 Updated Apr 12, 2020

Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be …

C 17 1 Updated Oct 12, 2021

Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted …

C 5 Updated Apr 12, 2020

Golang programs for AES-CTR mode encryption with 2 different hashing algorithm and Padding Oracle attack on AES-CTR mode.

Go 9 1 Updated Apr 12, 2020

Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.

Python 41 12 Updated May 8, 2020

The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.

3 Updated Apr 13, 2020

The repository is a collection of repositories that performs various cryptanalysis attacks.

3 Updated May 5, 2020

Now the worlds largest companies and organizations are racing to create the required AR Cloud infrastructure, to build and fuel these systems. This is where we will face unprecedented challenges an…

7 Updated Apr 2, 2020

Cryptanalysis of Enigma M4 in Go Lang with pure statistical means utilizing Index of Coincidence and Trigram analysis.

Go 8 Updated Apr 2, 2020

EN.650.624 Network Security

C 27 13 Updated May 6, 2025

This is a Forensics Report made after a thorough digital examination of the Jeans Case Evidence Image.

17 3 Updated Aug 6, 2020

This is an application that utilises google cloud platform that does event management. There are protection again CSRF attacks.

Python 5 Updated May 1, 2023

Exposing several ports unnecessarily can be a security risk, by exposing ports there will be a channel for unsecured communications and unrestricted traffic. By creating a special networks for the …

Python 14 7 Updated Nov 15, 2021