-
Updated
Jun 26, 2024
system-security
Here are 25 public repositories matching this topic...
🐧🔥System security testing tools(compatible with Debian/Centos/Ubuntu/Kali/Mint,use the nmap and hydra security testing tools)
-
Updated
Jul 18, 2021 - Shell
Penguin OS Forensic (or Flight) Recorder
-
Updated
Jan 13, 2024 - Perl
Evading Provenance-Based ML Detectors with Adversarial System Actions
-
Updated
Jun 23, 2023 - Python
A Windows CIS benchmark policy compliance auditor
-
Updated
May 2, 2024 - PowerShell
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] SEMESTER VI
-
Updated
Mar 13, 2024 - Python
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
-
Updated
Feb 20, 2021 - Python
Using domain name on IPtables. Keep updated firewall rules from dynamic DNS (DDNS).
-
Updated
Apr 27, 2021 - Go
Resources for the Cybersecurity Bootcamp.
-
Updated
Jan 20, 2024
🔒 🔑 👮♂️ Pasword Hashing based on System.Security.Cryptography and OBVIEX
-
Updated
Apr 14, 2017 - C#
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
-
Updated
May 6, 2020 - Python
This is a complete guide to securing your AWS servers for algorihtmic trading.
-
Updated
Nov 2, 2022 - Shell
Securinator will streamline Network Administrationby saving time issuing commands by outputing time consuming commands to a TXT file and then displaying the results in a Command Prompt to avoid having to use long commands repededly. Securinator is good for compairing system and file properties aswell as seeking seeking out malware manually and …
-
Updated
Jan 13, 2022 - Batchfile
Intrusion Detection in Computer Systems using Machine Learning Models.
-
Updated
May 15, 2021 - Jupyter Notebook
These are just random experiments and practical programs written by me during college.
-
Updated
Jun 15, 2021 - Python
Some Shell Scripts for System Exploitation
-
Updated
Apr 22, 2019 - Shell
A repository to hold code for security related examples
-
Updated
Jul 28, 2023 - Perl
Usermode rootkit scanner written in C x86 + x86_64
-
Updated
Apr 6, 2024 - C
Improve this page
Add a description, image, and links to the system-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the system-security topic, visit your repo's landing page and select "manage topics."