Project for Information assurance and security
☆11Dec 7, 2020Updated 5 years ago
Alternatives and similar repositories for Data-duplication-removal-using-file-checksum
Users that are interested in Data-duplication-removal-using-file-checksum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- Application to securely send messages using encryption, decryption and hashing techniques.☆12Dec 7, 2015Updated 10 years ago
- If anyone has idea to improve this algorithm. Then go through this link https://www.quantconnect.com☆20Mar 21, 2021Updated 5 years ago
- Oasis Infobyte Web Development and Designing one month internship program☆10Sep 30, 2022Updated 3 years ago
- The little lemon app is the capstone project for Meta's Front-End Developer Certificate on Coursera☆10Jul 20, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Meta Front-End Developer Capstone Project | Little-Lemon restaurant website☆10Feb 25, 2024Updated 2 years ago
- using LSB method in python☆17Feb 5, 2022Updated 4 years ago
- an e-learning website with recommender system,☆13Oct 26, 2019Updated 6 years ago
- Phishing Website detection with Machine Learning. This include flask server, chrome extension and machine learning for phishing website d…☆13Sep 27, 2021Updated 4 years ago
- This project is based on image steganography using DCT and AES encryption systems.☆18Jun 18, 2022Updated 3 years ago
- Foresight: Real-time CCTV 📹 anomaly detection and incident prediction. AI-powered 🧠 security for proactive threat prevention. Stay vig…☆20Dec 13, 2023Updated 2 years ago
- ☆10Oct 5, 2021Updated 4 years ago
- You can use this repo to get started with GitHub☆10Jul 6, 2022Updated 3 years ago
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Improved way of securing data using combined Steganography and Cryptographic techniques☆17Jul 25, 2023Updated 2 years ago
- A cryptography API wrapping the Sodium library, providing a simple object interface for symmetrical and asymmetrical encryption, decrypti…☆31Dec 11, 2022Updated 3 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- Oasis Infobyte Task Submission Repository☆13Jun 11, 2024Updated last year
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆13Oct 16, 2025Updated 5 months ago
- Oasis InfoByte Internship Projects list☆21Jan 8, 2023Updated 3 years ago
- A Gradle plugin for checking whether an .apk or an .aar contains OpenSSL versions with known vulnerabilities☆12Nov 28, 2016Updated 9 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Checkpoint 401 Forward Auth Security Server.☆17Jun 13, 2024Updated last year
- Check Safety of SSH Public Keys☆12Oct 8, 2022Updated 3 years ago
- CCE - Sem 4 Lab MIT Manipal☆18Feb 11, 2023Updated 3 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Realtime video processing to count people using open-cv, flask, and imagezmq☆10Jul 12, 2020Updated 5 years ago
- Simple implementation of the Go-Back-N protocol using UDP (Java).☆14Aug 18, 2014Updated 11 years ago
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- This is the Complete Free Source Code of Food App that we had made in our Youtube Channel Android Tutorials. Make Sure you do necessary c…☆12Jul 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Checking for leaked passwords through haveibeenpwned v2 API using the hash-range checker☆12Feb 7, 2024Updated 2 years ago
- PostgreSQL TokenStore for Passwordless☆13Dec 15, 2017Updated 8 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Final capstone project for Meta Front-end developer program on Coursera, which contains a detailed and responsive website with table-book…☆20Feb 27, 2023Updated 3 years ago
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 4 years ago
- Android application for checking security level of DRM and HDCP☆11Jan 23, 2023Updated 3 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago