Minhal128 / E-locks-A-blockchain-based-voting-system
E-locks: A blockchain-based voting system E-locks is a robust voting system implemented in C++ and OpenCV, leveraging blockchain technology for enhanced security and transparency. The system integrates facial recognition for user identification and encryption techniques to securely store voter data. Each vote is recorded in a blockchain ledger..…
☆14Updated 9 months ago
Alternatives and similar repositories for E-locks-A-blockchain-based-voting-system:
Users that are interested in E-locks-A-blockchain-based-voting-system are comparing it to the libraries listed below
- ImagiMingle is a Python project that generates random images using Unsplash's API. It features a user-friendly interface to easily explor…☆16Updated 8 months ago
- Our Project consists of a Web-based graphical interface, in which you need to connect and log in to the required URL. Here our First acti…☆9Updated last year
- SPYSEE is an open-source keylogger malware designed to capture real-time images and screenshots of the user's screen. It can grab private…☆20Updated 6 months ago
- Malware attacks/techniques explained☆119Updated 2 months ago
- Pure Malware Development Resource Collections☆272Updated 3 months ago
- Malware Development for Ethical Hackers, published by Packt☆308Updated 4 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆313Updated last week
- Cybersecurity research results. Simple C/C++ and Python implementations☆222Updated last week
- ⚠️ malware development☆538Updated 10 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆709Updated last month
- Embed a payload inside a PNG file☆311Updated 6 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆375Updated 6 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆373Updated 4 months ago
- A continuation of the famous quasar remote administration tool☆124Updated this week
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆514Updated 10 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆236Updated 6 months ago
- AV/EDR Lab environment setup references to help in Malware development☆374Updated 2 months ago
- This is for Ethical Use only.☆327Updated 3 weeks ago
- ☆348Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆140Updated last year
- What the name says....☆94Updated 7 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆176Updated last month
- PDF dropper Red Team Scenairos☆204Updated 8 months ago
- My collection of malware dev links☆262Updated 7 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆671Updated last month
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆272Updated 2 weeks ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆391Updated 4 months ago
- Reverse Engineering and Malware Analysis Roadmap☆120Updated 2 weeks ago
- Real fucking shellcode encryptor & obfuscator tool☆828Updated this week
- Tool to evade Antivirus With Different Techniques☆179Updated last year