- Seattle, WA
Stars
Fluffy Pancakes is a library designed to detect phishing websites.
Vehicular heatstroke, hyperthermia. The devastating effects of a child being left in a hot car. It's every parent's unfathomable nightmare, yet it happens several times a year. This is a project th…
A python based chat-bot based on deep seq2seq model trained to talk and interact like a friend. The system uses a encoder-decoder architecture with each block being a LSTM model. The models were tr…
Python program to recognise faces and smiles
The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project ill…
Golang programs for AES -CBC mode encryption with HMAC-SHA256 and Padding Oracle attack on AES-CBC mode.
The repository contains configuring various network components and application of its associated security in it.
Threat modeling of an open-source VPN Client - OpenConnect using Microsoft Threat Modeling Tool
The task was to reverse engineer an open-source software and a custom binary using various diagnostic tools and security assessment techniques.
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be …
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted …
Golang programs for AES-CTR mode encryption with 2 different hashing algorithm and Padding Oracle attack on AES-CTR mode.
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
The repository is a collection of repositories that performs various cryptanalysis attacks.
Now the worlds largest companies and organizations are racing to create the required AR Cloud infrastructure, to build and fuel these systems. This is where we will face unprecedented challenges an…
Cryptanalysis of Enigma M4 in Go Lang with pure statistical means utilizing Index of Coincidence and Trigram analysis.
This is a Forensics Report made after a thorough digital examination of the Jeans Case Evidence Image.
This is an application that utilises google cloud platform that does event management. There are protection again CSRF attacks.
Exposing several ports unnecessarily can be a security risk, by exposing ports there will be a channel for unsecured communications and unrestricted traffic. By creating a special networks for the …