CyberPhoenix-0 / metamorphReborn
Project for CyberSecurity Bachelor
☆16Updated 3 years ago
Alternatives and similar repositories for metamorphReborn:
Users that are interested in metamorphReborn are comparing it to the libraries listed below
- Cybersecurity Internship Project☆87Updated 2 years ago
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆59Updated 2 years ago
- Cybersecurity Projects☆17Updated 2 years ago
- Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate☆98Updated last year
- A collection of python cybersecurity projects☆37Updated last year
- A Repo to keep the CyberSecurity-IIITA projects☆15Updated 7 years ago
- I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilitie…☆89Updated 5 months ago
- ☆28Updated 6 years ago
- Cyber Security Course Term Project☆15Updated 7 years ago
- Final Year Malware Detection Project with PPT, Research Paper, code and Synopsis. Malware detection project by Machine Learning ALgorithm…☆120Updated 2 years ago
- A collection of introductory cybersecurity projects that I have completed in my spare time.☆32Updated 2 years ago
- File System Integrity checker (etc)☆27Updated 7 years ago
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆15Updated last year
- Network Intrusion Detection System Project using Machine Learning with code and Documents☆69Updated 2 years ago
- ☆103Updated last year
- It is a advanced keylogger.☆40Updated 8 months ago
- Final year Project in the field of Cyber-Security☆50Updated 4 years ago
- Study notes for the Certified Ethical Hacker v12.☆27Updated 2 years ago
- ☆24Updated 3 years ago
- Ransomware Detection using Machine Learning Models and Ensemble Technique☆28Updated 7 months ago
- Follow this repo if you are taking CEH(Practical) Exam By Ec-Council☆61Updated 3 years ago
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆15Updated 4 years ago
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆157Updated 8 months ago
- ☆39Updated 3 years ago
- I developed a python code which will simply run in the command prompt and it will send the key logging information through the email add…☆37Updated 4 years ago
- Projects related to Information security/Cyber security/Cryptography☆30Updated last year
- An image encryption node-js cli☆76Updated 3 years ago
- CEH Practical☆50Updated last year
- CEH Practical Exam☆35Updated 3 years ago
- CEHv12 Notes☆14Updated last year