The Lazarus Group
The project focuses on studying APT attacks, especially those by APT38 linked to North Korea. It aims to understand their methods, including custom malware and spear-phishing, and catalog the software they use, like Dark Comet and Mimikatz, to improve cybersecurity defenses.
View Project
Vulnerability Assessment and Penetration Testing (VAPT)
This project tests the security of four simulated systems (CTF boxes) to find weaknesses and suggest improvements. It helps improve defenses against cyberattacks.
View Project
Secure Chat Application
This project is a secure chat system built with Python for confidential communication. It uses encryption (RSA, ElGamal) and user authentication to protect messages and user privacy. It also offers features like group chat, multi-user roles, and a user-friendly interface.
View Project
ShieldXpert Antivirus
ShieldXpert Antivirus is a user-friendly Python antivirus that tackles modern threats. It offers scanning, encryption, and secure deletion using cloud-based detection and encryption libraries. Designed with easy use in mind, it adapts to new threats and acknowledges the contributions of its creators.
View Project
Analysis of Process Management Techniques in Operating Systems
This paper explores process management in operating systems, covering its role in smooth system operation, scheduling, communication, and real-world examples. It emphasizes the importance of process management for efficient performance and highlights comparisons between Linux and Android processes.
View Project
CPU Vulnerability
This paper examines CPU weaknesses caused by performance-boosting features. It analyzes vulnerabilities like Spectre and Meltdown, and how CPU design is adapting to improve security.
View Project
Digital Forensic
This report summarizes four software tools for IT professionals: SIW (system information), WFA (forensic analysis), Wireshark (network traffic inspection), and Redline (memory analysis). These tools aid in troubleshooting, investigations, and security analysis.
View Project
SQL Injection
This report covers SQL Injection vulnerability, its impact, and mitigation. SQL Injection allows attackers to manipulate databases, compromising sensitive data. Recommendations include secure coding, updates, access controls, and training to enhance defenses and protect data and reputation.
View Project
Text Converter
This Python program enables text-to-Morse and Morse-to-text conversion. It uses a dictionary to map English alphabet and numbers to Morse code. With functions for both conversions, it serves as a practical tool for Morse code enthusiasts to learn, practice, and transmit messages.
View Project
Encryption a piller of Data Security
This report delves into their significance, focusing on encryption keys and cryptography.
View Project
Generating and Validating Password
This report analyzes a C program that generates random passwords and validates user input. The program offers three attempts to match the generated password. While functional, it lacks security measures like password complexity checks.
View Project