Information Security and Privacy Assignment at NYU
-
Updated
Jun 12, 2018 - Jupyter Notebook
Information Security and Privacy Assignment at NYU
List of various ethical hacking tools
Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.
This is the repor where I have published all my Conference Talks Slids on Information Security
VulNyx is a website that contains a list of vulnerable machines that are Unix based.
Info Sec home lab blog
Offensive Security Research, Corporate Espionage Investigation
THAMARA - Threat Hunting with AMSI and YARA
A secure and user-friendly password encryption and decryption tool, leveraging advanced cryptography for reliable password management.
A collection of resources to help women get into the cyber security industry
Shade_hunt is an open-source Node.js brute force tool designed to test the security and authentication of systems. With a minimalistic and highly customizable interface, it allows for testing different types of authentication, from simple passwords to API keys and access tokens.
Tools & Cases
Writeups from HTB, THM, and various CTFs.
Common (and Advanced) Information Security Questions. Questions you should know the answer to for your information security career.
A tools for mathematical caculation such as greatest common factor, primitive roots, primality test .etc
TOR VPN - USE TOR LIKE VPN
All things Cybersecurity!
Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more
lightweight http redirector written in nim
Add a description, image, and links to the informationsecurity topic page so that developers can more easily learn about it.
To associate your repository with the informationsecurity topic, visit your repo's landing page and select "manage topics."