Project for Information assurance and security
☆11Dec 7, 2020Updated 5 years ago
Alternatives and similar repositories for Data-duplication-removal-using-file-checksum
Users that are interested in Data-duplication-removal-using-file-checksum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 5 years ago
- If anyone has idea to improve this algorithm. Then go through this link https://www.quantconnect.com☆20Mar 21, 2021Updated 5 years ago
- Application to securely send messages using encryption, decryption and hashing techniques.☆12Dec 7, 2015Updated 10 years ago
- Oasis Infobyte Web Development and Designing one month internship program☆11Sep 30, 2022Updated 3 years ago
- The little lemon app is the capstone project for Meta's Front-End Developer Certificate on Coursera☆11Jul 20, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Meta Front-End Developer Capstone Project | Little-Lemon restaurant website☆10Feb 25, 2024Updated 2 years ago
- using LSB method in python☆17Feb 5, 2022Updated 4 years ago
- an e-learning website with recommender system,☆13Oct 26, 2019Updated 6 years ago
- Phishing Website detection with Machine Learning. This include flask server, chrome extension and machine learning for phishing website d…☆13Sep 27, 2021Updated 4 years ago
- This project is based on image steganography using DCT and AES encryption systems.☆18Jun 18, 2022Updated 3 years ago
- Foresight: Real-time CCTV 📹 anomaly detection and incident prediction. AI-powered 🧠 security for proactive threat prevention. Stay vig…☆20Dec 13, 2023Updated 2 years ago
- ☆10Oct 5, 2021Updated 4 years ago
- You can use this repo to get started with GitHub☆10Jul 6, 2022Updated 3 years ago
- This Repository consists of all the Jupyter Notebook (.ipynb) files, python files, excel sheets which are a part of the BCGX's Gen AI Vir…☆11Jun 20, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- Improved way of securing data using combined Steganography and Cryptographic techniques☆17Jul 25, 2023Updated 2 years ago
- A cryptography API wrapping the Sodium library, providing a simple object interface for symmetrical and asymmetrical encryption, decrypti…☆31Dec 11, 2022Updated 3 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- Oasis Infobyte Task Submission Repository☆13Jun 11, 2024Updated last year
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆13Oct 16, 2025Updated 6 months ago
- Oasis InfoByte Internship Projects list☆21Jan 8, 2023Updated 3 years ago
- A Gradle plugin for checking whether an .apk or an .aar contains OpenSSL versions with known vulnerabilities☆13Nov 28, 2016Updated 9 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Checkpoint 401 Forward Auth Security Server.☆17Apr 25, 2026Updated 2 weeks ago
- Check Safety of SSH Public Keys☆12Oct 8, 2022Updated 3 years ago
- CCE - Sem 4 Lab MIT Manipal☆18Feb 11, 2023Updated 3 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Realtime video processing to count people using open-cv, flask, and imagezmq☆10Jul 12, 2020Updated 5 years ago
- Simple implementation of the Go-Back-N protocol using UDP (Java).☆14Aug 18, 2014Updated 11 years ago
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is the Complete Free Source Code of Food App that we had made in our Youtube Channel Android Tutorials. Make Sure you do necessary c…☆12Jul 11, 2021Updated 4 years ago
- Checking for leaked passwords through haveibeenpwned v2 API using the hash-range checker☆12Feb 7, 2024Updated 2 years ago
- PostgreSQL TokenStore for Passwordless☆13Dec 15, 2017Updated 8 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Final capstone project for Meta Front-end developer program on Coursera, which contains a detailed and responsive website with table-book…☆20Feb 27, 2023Updated 3 years ago
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 4 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago