Code Monkey home page Code Monkey logo

Arvind Ponnarassery Jayan's Projects

aes-cbc-padding-attack icon aes-cbc-padding-attack

Golang programs for AES -CBC mode encryption with HMAC-SHA256 and Padding Oracle attack on AES-CBC mode.

aes-ctr-padding-attack icon aes-ctr-padding-attack

Golang programs for AES-CTR mode encryption with 2 different hashing algorithm and Padding Oracle attack on AES-CTR mode.

ar-cloud-privacy icon ar-cloud-privacy

Now the worlds largest companies and organizations are racing to create the required AR Cloud infrastructure, to build and fuel these systems. This is where we will face unprecedented challenges and risks to privacy and individuals rights and freedom if we do not actively and mindfully seek to address the possible issues. AR- Cloud is a cloud infrastructure, by understanding how it uses cloud computing and it’s features and functionality, we can realize the possible security issues and privacy risk for this infrastructure and try to address them.

breaking-diffie-hellman icon breaking-diffie-hellman

This problem will implement two discrete logarithm programs that can break Diffie-Hellman at various key strengths.

buffer-overflow-attack-adventure icon buffer-overflow-attack-adventure

Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.

business-maturity-and-cybersecurity icon business-maturity-and-cybersecurity

The cybersecurity leadership maturity for a company defines how it responds to cybersecurity threats and issues. The higher the maturity state, the stronger the company is in the cybersecurity front. This paper attempts to find whether there is a correlation between this business maturity and cybersecurity table-top exercises.

citadel-email-server-setup icon citadel-email-server-setup

This application sets up the citadel email server (citadel suite) on the RPI4B in a docker container and allows different users to communicate with each other through server using a browser. The browser is placed in the client machine (on the VM) which is connected to the server in the same LAN.

cryptanalysis icon cryptanalysis

The repository is a collection of repositories that performs various cryptanalysis attacks.

diffie-hellman-key-exchange icon diffie-hellman-key-exchange

Go program that implements the Diffie-Hellman key exchange protocol at a 1024-bit key strength, this consists of parameter generation, share exchange, and key derivation.

docker-mutiple-containers icon docker-mutiple-containers

Exposing several ports unnecessarily can be a security risk, by exposing ports there will be a channel for unsecured communications and unrestricted traffic. By creating a special networks for the containers to share, the host is isolated from the multiple containers utilized.

enigma-m4-cryptanalysis icon enigma-m4-cryptanalysis

Cryptanalysis of Enigma M4 in Go Lang with pure statistical means utilizing Index of Coincidence and Trigram analysis.

format-string-vulnerability-angband icon format-string-vulnerability-angband

Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.

frontend-nanodegree-resume icon frontend-nanodegree-resume

This repository is used for one of the projects in Udacity's Front-End Web Developer Nanodegree program. Learn how to become a Front-End Developer today with line-by-line code reviewed projects and get a job with career services!

gps-spoofing icon gps-spoofing

Understanding GPS spoofing and mitigation strategy to develop a novel mitigation strategy.

gpstracker icon gpstracker

A location based android application to track a group of members. This can be used for tracking children.

program-module-and-software-copyright-protection-eligibility icon program-module-and-software-copyright-protection-eligibility

In this digital age where the copyright protection for program modules and software seems to be growing narrower due to Fair use and Merger doctrine. It would be better that software is considered as another section altogether due to its aspect of functionality.

roll-a-ball-game icon roll-a-ball-game

This is a simple Rolling Ball game created using Unity hub and utilizes C# programming language.

secure-iot-healthcare-device icon secure-iot-healthcare-device

The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project illustrates a process for identifying a vulnerability and proposes a solution for mitigating the same.

software-vulnerability-analysis icon software-vulnerability-analysis

The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.