A very vulnerable online chat application
-
Updated
Apr 1, 2019 - Java
A very vulnerable online chat application
Password security auditing tool for login over HTTP GET or HTTP Basic Authentication.
HACKING TOOLS
Terraform module of an active-passive FortiGate Azure NVA cluster.
Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis (OSDI '18) implementation focused on composability
Some algorithm of network cryptography
This is a symmetric key cryptography algorithm where the plain text is encrypted using a private key and resizer parameter taken as input from the user. The encryption technique uses genetic algorithm and mathematical operations. Level of complexity of encryption and the size of the final cipher text can be regulated using the resizer parameter.
Strengthen your cybersecurity defenses with proactive risk identification and mitigation. Explore our guide for deploying Nessus effectively in a virtualized setup.
Implementation of Cryptography and Network Security Algorithms
Bulk WHOIS Search
TCP Port Scanner written in Python
Repository to sync CNS Lab work across devices.
A logging and analysis engine built in Java. Functions similarly to a honeypot
Power is gainer by sharing knowledge, not hoarding it!
Some scripts written when taking a network security course in Python using the socket and cryptography libraries.
Python assistant for McAfee/Skyhigh Secure Web Gateway
Add a description, image, and links to the network-security topic page so that developers can more easily learn about it.
To associate your repository with the network-security topic, visit your repo's landing page and select "manage topics."