Skip to content
@Information-Technology-Security

Information Technology Security

This course provides knowledge and skills in IT security, including vulnerabilities, policies, cryptography, forensics, and intrusion detection.

Popular repositories Loading

  1. Buffer-Overflow Buffer-Overflow Public

    Educational project demonstrating stack-based buffer overflow vulnerabilities, including exploitation techniques and modern OS defense mechanisms (ASLR, NX, stack canaries), implemented in C for co…

    C

  2. Cryptography Cryptography Public

    Academic cryptography project implementing RSA encryption, decryption, digital signatures, and X.509 certificate verification in C using the OpenSSL BIGNUM (BN) library, bridging theoretical crypto…

    C

  3. SQL-Injection SQL-Injection Public

    Academic security project demonstrating SQL Injection vulnerabilities in a MySQL environment, including data extraction, authentication bypass, and privilege escalation, along with effective mitiga…

  4. Android-Repackaging Android-Repackaging Public

    Academic security project demonstrating an Android repackaging attack, where a legitimate APK is disassembled, modified with malicious smali code, re-signed, and redeployed to perform privacy-invas…

    HTML

  5. TLS-Scanning TLS-Scanning Public

    Laboratory project for Information Technology Security focusing on TLS/SSL vulnerability scanning, analyzing protocol versions, cipher suites, and known attacks using Qualys SSL Labs and the A2SV P…

Repositories

Showing 5 of 5 repositories
  • TLS-Scanning Public

    Laboratory project for Information Technology Security focusing on TLS/SSL vulnerability scanning, analyzing protocol versions, cipher suites, and known attacks using Qualys SSL Labs and the A2SV Python-based scanner (Information Technology Security, UNIWA).

    Information-Technology-Security/TLS-Scanning’s past year of commit activity
    0 0 0 0 Updated Jan 20, 2026
  • Android-Repackaging Public

    Academic security project demonstrating an Android repackaging attack, where a legitimate APK is disassembled, modified with malicious smali code, re-signed, and redeployed to perform privacy-invasive actions such as contact deletion and location tracking (Information Technology Security, UNIWA).

    Information-Technology-Security/Android-Repackaging’s past year of commit activity
    HTML 0 0 0 0 Updated Jan 20, 2026
  • SQL-Injection Public

    Academic security project demonstrating SQL Injection vulnerabilities in a MySQL environment, including data extraction, authentication bypass, and privilege escalation, along with effective mitigation using prepared statements (Information Technology Security, UNIWA).

    Information-Technology-Security/SQL-Injection’s past year of commit activity
    0 0 0 0 Updated Jan 19, 2026
  • Cryptography Public

    Academic cryptography project implementing RSA encryption, decryption, digital signatures, and X.509 certificate verification in C using the OpenSSL BIGNUM (BN) library, bridging theoretical cryptography with real-world security applications (Information Technology Security, UNIWA).

    Information-Technology-Security/Cryptography’s past year of commit activity
    C 0 0 0 0 Updated Jan 19, 2026
  • Buffer-Overflow Public

    Educational project demonstrating stack-based buffer overflow vulnerabilities, including exploitation techniques and modern OS defense mechanisms (ASLR, NX, stack canaries), implemented in C for controlled lab environments (Information Technology Security, UNIWA).

    Information-Technology-Security/Buffer-Overflow’s past year of commit activity
    C 0 0 0 0 Updated Jan 19, 2026

Top languages

Loading…

Most used topics

Loading…