arvindpj007 Goto Github PK
Name: Arvind Ponnarassery Jayan
Type: User
Company: @jhu-information-security-institute
Location: Seattle, WA
Name: Arvind Ponnarassery Jayan
Type: User
Company: @jhu-information-security-institute
Location: Seattle, WA
Golang programs for AES -CBC mode encryption with HMAC-SHA256 and Padding Oracle attack on AES-CBC mode.
Golang programs for AES-CTR mode encryption with 2 different hashing algorithm and Padding Oracle attack on AES-CTR mode.
Now the worlds largest companies and organizations are racing to create the required AR Cloud infrastructure, to build and fuel these systems. This is where we will face unprecedented challenges and risks to privacy and individuals rights and freedom if we do not actively and mindfully seek to address the possible issues. AR- Cloud is a cloud infrastructure, by understanding how it uses cloud computing and itβs features and functionality, we can realize the possible security issues and privacy risk for this infrastructure and try to address them.
This problem will implement two discrete logarithm programs that can break Diffie-Hellman at various key strengths.
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
The cybersecurity leadership maturity for a company defines how it responds to cybersecurity threats and issues. The higher the maturity state, the stronger the company is in the cybersecurity front. This paper attempts to find whether there is a correlation between this business maturity and cybersecurity table-top exercises.
This application sets up the citadel email server (citadel suite) on the RPI4B in a docker container and allows different users to communicate with each other through server using a browser. The browser is placed in the client machine (on the VM) which is connected to the server in the same LAN.
The repository contains configuring various network components and application of its associated security in it.
The repository is a collection of repositories that performs various cryptanalysis attacks.
Go program that implements the Diffie-Hellman key exchange protocol at a 1024-bit key strength, this consists of parameter generation, share exchange, and key derivation.
This is a Forensics Report made after a thorough digital examination of the Jeans Case Evidence Image.
Exposing several ports unnecessarily can be a security risk, by exposing ports there will be a channel for unsecured communications and unrestricted traffic. By creating a special networks for the containers to share, the host is isolated from the multiple containers utilized.
This Elgamal variant will use a hash function (SHA256) to compute a key for the AES-GCM encryption scheme.
Cryptanalysis of Enigma M4 in Go Lang with pure statistical means utilizing Index of Coincidence and Trigram analysis.
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
This repository is used for one of the projects in Udacity's Front-End Web Developer Nanodegree program. Learn how to become a Front-End Developer today with line-by-line code reviewed projects and get a job with career services!
This is an application that utilises google cloud platform that does event management. There are protection again CSRF attacks.
Understanding GPS spoofing and mitigation strategy to develop a novel mitigation strategy.
A location based android application to track a group of members. This can be used for tracking children.
Healthcare Industry Risk Management Analysis focusing on HIPAA data and protocols.
In this digital age where the copyright protection for program modules and software seems to be growing narrower due to Fair use and Merger doctrine. It would be better that software is considered as another section altogether due to its aspect of functionality.
The task was to reverse engineer an open-source software and a custom binary using various diagnostic tools and security assessment techniques.
This is a simple Rolling Ball game created using Unity hub and utilizes C# programming language.
The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project illustrates a process for identifying a vulnerability and proposes a solution for mitigating the same.
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Authors Guild v. Google was a copyright case heard between 2005 and 2015. This paper attempts to analyze this appellate decision focusing more on the Cybersecurity aspects of the case.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
π Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. πππ
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google β€οΈ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.