Evading Provenance-Based ML Detectors with Adversarial System Actions
-
Updated
Aug 18, 2024 - Python
Evading Provenance-Based ML Detectors with Adversarial System Actions
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] SEMESTER VI
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
A Privacy safe-guard app. To generate/save passwords and to generate fake identities.
These are just random experiments and practical programs written by me during college.
MSc in Computer Science UNIBZ
Rubber Ducky is an awareness initiative focused on educating individuals and organizations about potential cybersecurity threats that can be delivered through USB devices, particularly targeting issues like ransomware, backdoors, and keyloggers. Leveraging the concept of Bad USB and the functionality of Rubber Ducky USBs.
This cross-platform app monitors file and directory changes, tracking creation, modification, deletion, and movement in real time. It features a user-friendly GUI, robust CLI, log management, import/export of watchlists, error resilience, and supports multiple directories for versatile use cases.
Add a description, image, and links to the system-security topic page so that developers can more easily learn about it.
To associate your repository with the system-security topic, visit your repo's landing page and select "manage topics."