Evading Provenance-Based ML Detectors with Adversarial System Actions
-
Updated
Aug 18, 2024 - Python
Evading Provenance-Based ML Detectors with Adversarial System Actions
A Password Generator and Saving app made with python using Tkinter library.
Penguin OS Forensic (or Flight) Recorder
The lazypoline syscall interposer
A Windows CIS benchmark policy compliance auditor
Usermode rootkit scanner written in C x86 + x86_64
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] SEMESTER VI
Resources for the Cybersecurity Bootcamp.
A repository to hold code for security related examples
A world UI to fix capitalism by putting Demand in front of Supply. People dynamically input what they would buy with $150K salary, and then we reverse-engineer and align work and resources to make what we want.
ini merupakan repository kumpulan kode sumber (source code) yang digunakan untuk melakukan pengenalan wajah (facerecognition) dengan menggunakan pustaka OpenCV
This is a complete guide to securing your AWS servers for algorihtmic trading.
Securinator will streamline Network Administrationby saving time issuing commands by outputing time consuming commands to a TXT file and then displaying the results in a Command Prompt to avoid having to use long commands repededly. Securinator is good for compairing system and file properties aswell as seeking seeking out malware manually and …
🐧🔥System security testing tools(compatible with Debian/Centos/Ubuntu/Kali/Mint,use the nmap and hydra security testing tools)
These are just random experiments and practical programs written by me during college.
Intrusion Detection in Computer Systems using Machine Learning Models.
Using domain name on IPtables. Keep updated firewall rules from dynamic DNS (DDNS).
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
Add a description, image, and links to the system-security topic page so that developers can more easily learn about it.
To associate your repository with the system-security topic, visit your repo's landing page and select "manage topics."