This is the implement of the Chacha20 algorithm that applies actual real-time encryption on user input data/texts
-
Updated
May 21, 2024 - C
This is the implement of the Chacha20 algorithm that applies actual real-time encryption on user input data/texts
⏰ Computer Architecture and Security Conference Deadline Countdowns (Based on AI Deadlines)
Popup-virus: Educational repository exploring malware and cybersecurity. Caution advised.
A collection of awesome security hardening guides, tools and other resources
ReverseIT Website
01076042 INFORMATION AND COMPUTER SECURITY
The Data Encryption Standard (DES) implementation used for encrypting/decrypting blocks of bits. This program implements the complex algorithm in C++.
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
Implementation of Kerberos protocol with client KDC and message center
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Fictional Client-Server Architecture in C to implement theoretical concepts of Computer Security.
A SFTP application that works over a local network. AKA "SecureDrop"
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
AES encryption algorithm implementation in C++
ReverseIT Library
💻⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.
En este trabajo se investigan y desarrollan diversas técnicas para combatir la piratería informática y la ingeniería inversa, con el fin de proteger programas externos previamente compilados de las manos de personas con malas intenciones.
Computer Security course project facilitating encrypted file storage, sharing, and concurrent modifications across multiple devices.
Collection of research papers
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."