Minhal128 / E-locks-A-blockchain-based-voting-system
E-locks: A blockchain-based voting system E-locks is a robust voting system implemented in C++ and OpenCV, leveraging blockchain technology for enhanced security and transparency. The system integrates facial recognition for user identification and encryption techniques to securely store voter data. Each vote is recorded in a blockchain ledger..…
☆14Updated 8 months ago
Alternatives and similar repositories for E-locks-A-blockchain-based-voting-system:
Users that are interested in E-locks-A-blockchain-based-voting-system are comparing it to the libraries listed below
- ImagiMingle is a Python project that generates random images using Unsplash's API. It features a user-friendly interface to easily explor…☆15Updated 6 months ago
- Our Project consists of a Web-based graphical interface, in which you need to connect and log in to the required URL. Here our First acti…☆9Updated last year
- SPYSEE is an open-source keylogger malware designed to capture real-time images and screenshots of the user's screen. It can grab private…☆20Updated 4 months ago
- Malware Development for Ethical Hackers, published by Packt☆290Updated 3 months ago
- Pure Malware Development Resource Collections☆232Updated 2 months ago
- Malware attacks/techniques explained☆117Updated 2 weeks ago
- ⚠️ malware development☆509Updated 9 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆207Updated last week
- My collection of malware dev links☆258Updated 6 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆250Updated 2 weeks ago
- ☆340Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆364Updated 3 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆253Updated 8 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆363Updated 4 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆565Updated 2 weeks ago
- AV/EDR Lab environment setup references to help in Malware development☆363Updated 2 weeks ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆511Updated 8 months ago
- Embed a payload inside a PNG file☆298Updated 4 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆172Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆333Updated 5 months ago
- What the name says....☆91Updated 5 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆633Updated 4 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆292Updated last year
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆489Updated 3 weeks ago
- Analyse your malware to surgically obfuscate it☆455Updated last week
- Performing Indirect Clean Syscalls☆516Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆682Updated last month
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆344Updated 2 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆524Updated this week
- ☆97Updated 4 months ago