Information Technology Security
Popular repositories Loading
-
Buffer-Overflow
Buffer-Overflow PublicEducational project demonstrating stack-based buffer overflow vulnerabilities, including exploitation techniques and modern OS defense mechanisms (ASLR, NX, stack canaries), implemented in C for co…
C
-
Cryptography
Cryptography PublicAcademic cryptography project implementing RSA encryption, decryption, digital signatures, and X.509 certificate verification in C using the OpenSSL BIGNUM (BN) library, bridging theoretical crypto…
C
-
SQL-Injection
SQL-Injection PublicAcademic security project demonstrating SQL Injection vulnerabilities in a MySQL environment, including data extraction, authentication bypass, and privilege escalation, along with effective mitiga…
-
Android-Repackaging
Android-Repackaging PublicAcademic security project demonstrating an Android repackaging attack, where a legitimate APK is disassembled, modified with malicious smali code, re-signed, and redeployed to perform privacy-invas…
HTML
-
TLS-Scanning
TLS-Scanning PublicLaboratory project for Information Technology Security focusing on TLS/SSL vulnerability scanning, analyzing protocol versions, cipher suites, and known attacks using Qualys SSL Labs and the A2SV P…
Repositories
- TLS-Scanning Public
Laboratory project for Information Technology Security focusing on TLS/SSL vulnerability scanning, analyzing protocol versions, cipher suites, and known attacks using Qualys SSL Labs and the A2SV Python-based scanner (Information Technology Security, UNIWA).
Information-Technology-Security/TLS-Scanning’s past year of commit activity - Android-Repackaging Public
Academic security project demonstrating an Android repackaging attack, where a legitimate APK is disassembled, modified with malicious smali code, re-signed, and redeployed to perform privacy-invasive actions such as contact deletion and location tracking (Information Technology Security, UNIWA).
Information-Technology-Security/Android-Repackaging’s past year of commit activity - SQL-Injection Public
Academic security project demonstrating SQL Injection vulnerabilities in a MySQL environment, including data extraction, authentication bypass, and privilege escalation, along with effective mitigation using prepared statements (Information Technology Security, UNIWA).
Information-Technology-Security/SQL-Injection’s past year of commit activity - Cryptography Public
Academic cryptography project implementing RSA encryption, decryption, digital signatures, and X.509 certificate verification in C using the OpenSSL BIGNUM (BN) library, bridging theoretical cryptography with real-world security applications (Information Technology Security, UNIWA).
Information-Technology-Security/Cryptography’s past year of commit activity - Buffer-Overflow Public
Educational project demonstrating stack-based buffer overflow vulnerabilities, including exploitation techniques and modern OS defense mechanisms (ASLR, NX, stack canaries), implemented in C for controlled lab environments (Information Technology Security, UNIWA).
Information-Technology-Security/Buffer-Overflow’s past year of commit activity
Top languages
Loading…
Most used topics
Loading…