Faisal A. Garba's Projects
#CISFUN
:japanese_goblin: A Backdoor For Apache HTTP Server Written in C
APT & CyberCriminal Campaign Collection
Argument Mining Python implementation
A centralized (SDN-paradigm) controller to monitor IoT networks. In this implementation, it cooperates with Cooja, the contiki emulator to monitor RPL networks
Ixia ATI team open source or generally public material. Anything added here MUST be approved by Ixia Management.
A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
Organized list of my malware development resources
A curated list of awesome Python frameworks, libraries, software and resources
A curated list of Awesome Threat Intelligence resources
An archive of BASHLITE source code
A simple frequency analysis script for bind9 DNS query logs. Is able to analyze based on client IP address, DNS domain name, and DNS query type. Uses both regular expressions, and the Counter() dictionary from the Python collections module. Is written to demonstrate how useful the combination of a Counter() dictionary and regular expressions are.
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Don't let buffer overflows overflow your mind
Code repository for a YouTube Channel C Programming Tutorials
C Programming Projects
Implementation of a Caesar cipher, both encoding and decoding. The key is an integer from 1 to 25. This cipher rotates the letters of the alphabet (A to Z). The encoding replaces each letter with the 1st to 25th next letter in the alphabet (wrapping Z to A). So key 2 encrypts "HI" to "JK", but key 20 encrypts "HI" to "BC".
Argument Mining tool built in Python.
A Simple Argument Mining Library
:fire: A console-based software to help accumulate CGPA / SGPA data and extract useful results for the students of IIT KGP.
ActiveState Code Recipes
Collect View for cooja Emulator
contiki from iot-lab with extra prints and functions to show details for various attacks
Use this contiki for DODAG inconsistency attack ONLY. Create one or more attacker node(s).
contiki 3.0 with only a malicious node to be used as an attacker. Dont use this contiki for legitimate nodes
contiki-3.0 with a malicious node only. To be used as an attacker with an SDN-like external controller
Contiki-3.0 with a malicious node only. To be used as an attacker with an SDN-like external controller