Penguin OS Forensic (or Flight) Recorder
-
Updated
Jul 21, 2024 - Perl
Penguin OS Forensic (or Flight) Recorder
A Windows CIS benchmark policy compliance auditor
Evading Provenance-Based ML Detectors with Adversarial System Actions
The lazypoline syscall interposer
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] SEMESTER VI
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Using domain name on IPtables. Keep updated firewall rules from dynamic DNS (DDNS).
Resources for the Cybersecurity Bootcamp.
🔒 🔑 👮♂️ Pasword Hashing based on System.Security.Cryptography and OBVIEX
Securinator will streamline Network Administrationby saving time issuing commands by outputing time consuming commands to a TXT file and then displaying the results in a Command Prompt to avoid having to use long commands repededly. Securinator is good for compairing system and file properties aswell as seeking seeking out malware manually and …
A Privacy safe-guard app. To generate/save passwords and to generate fake identities.
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
This is a complete guide to securing your AWS servers for algorihtmic trading.
Some Shell Scripts for System Exploitation
These are just random experiments and practical programs written by me during college.
A repository to hold code for security related examples
Usermode rootkit scanner written in C x86 + x86_64
Intrusion Detection in Computer Systems using Machine Learning Models.
Add a description, image, and links to the system-security topic page so that developers can more easily learn about it.
To associate your repository with the system-security topic, visit your repo's landing page and select "manage topics."