personal blog
-
Updated
Oct 2, 2023 - HTML
personal blog
Security Event and Incident Management: A security software that helps recognize and address potential security threats and vulnerabilities.
On the road to CompTIA Security+
CVE Analysis Dashboard
Malicious URL Detection is designed to identify potentially harmful URLs using machine learning techniques. The model leverages various features of URLs to classify them as malicious or benign, providing an essential prediction for cybersecurity.
Let's Become Cybersecurity Analyst With me!!!
Система учета тренировок и статистики для команды по киберспорту
Projeto de Pesquisa para criação de uma ferramenta de CyberSegurança
Creating a machine learning model to detect factors that contribute to cyber attacks in an effort to limit the vulnerability of the average consumer.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Insurance in Cybersecurity.
CyberRakshak is a comprehensive web application designed to perform a detailed scan of any given website URL. It extracts vital information such as the domain's IP address, server name, subdomains along with their IP addresses and server names, and all URLs found on the main page.
Ini adalah repository writeup yang dibuat untuk mempelajari tentang Cyber-Security di bidang Ethical Hacking dan Penetration Testing, sehingga dapat melindungi diri dari peretas yang sebenarnya.
This Go code is used to listen to network traffic, monitor and analyze certain protocols. Users can listen to live traffic from a specific network interface, monitor protocols such as TCP, UDP, ICMP, and record traffic. It can be used in various applications such as network security and performance monitoring.
Repositório criado para agregar documentos, orientações e demais informações advindas de um grupo de estudos em Segurança de Dados
Efficient username search tool with customizable options, detailed results, color-coded output, robust error handling, and intelligent detection of usernames in URLs, titles, descriptions, and HTML content.
DDoS Detection using various ML models(Decision tree, Random Forest, Support Vector Machine(SVM), KNN, Neural Network, Gradient Boosting tree)
Repository contains malware IP addresses of C2 infrastructure
Tools for checking NIK
Add a description, image, and links to the cyber-analytics topic page so that developers can more easily learn about it.
To associate your repository with the cyber-analytics topic, visit your repo's landing page and select "manage topics."