nmbaibhab / Graphical-Password-SIH
Remembering numerous passwords from various different sites can be difficult for a user. So to provide some flexibility we can provide users a graphical password authentication system where instead of creating a password a user has to select graphical objects in a particular order to keep it as their password.
☆6Updated 3 years ago
Alternatives and similar repositories for Graphical-Password-SIH:
Users that are interested in Graphical-Password-SIH are comparing it to the libraries listed below
- Solution to SIH 22 problem statement Smart Attendance☆8Updated last year
- This config made in Phreakers madhureh☆8Updated 5 years ago
- An android application used to measure vital signals such as SpO2, Heart rate, Respiratory rate and Blood Pressure.☆24Updated 2 years ago
- Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & …☆11Updated 4 years ago
- Smart India Hackathon 2023☆32Updated last year
- This is the repository for IOSD BPIT Hacktoberfest 2022☆7Updated 2 years ago
- Helping Hand is an Online & Offline Disaster Management System for Govt. of Assam with motive to help government and people of Assam duri…☆31Updated 6 years ago
- ☆13Updated 10 months ago
- ☆18Updated last year
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- This repo contains all SQL Queries of the Basic Database Management Course of Coding Ninjas.☆31Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 2 years ago
- This game is developed in vanilla js. This project won 2nd prize in Merge Intern's Hack You Hackathon 🎉☆39Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Updated 2 years ago
- An app which will help to detect whether the product is authenticated or not using blockchain.☆28Updated 2 years ago
- This repository contains distributed systems assignments according to SPPU 2019 Pattern along with their execution steps☆22Updated last year
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- ☆25Updated last year
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 4 years ago
- Travel And Tourism - Database web Application Implemented using Flask framework, Sqlalchemy, Html,Css,Js.☆10Updated 4 years ago
- Computer vision project implemented with OpenCV☆115Updated 4 years ago
- A repo containing some awesome python projects.☆35Updated last year
- A Web Application that uses Computer Vision and Deep Learning to identify the three highest probability diagnoses for a skin lesion image…☆17Updated last year
- This is a repository for Hacktoberfest'22. You can visit Hackfest-22 website to see the various contributors, contributed in this reposi…☆11Updated 2 years ago
- The Advanced Automated Pentesting And Forensics Tool☆26Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- AI-enabled water well predictor (Clean & Green Technology) predetermined model☆10Updated 10 months ago
- My personal tech blog☆16Updated 4 months ago