HemanthReddy000's Stars
awedis/containers-architecture
iamjagdeesh/AWS-Image-Recognition-as-a-Service
Elastic cloud application which will provide Image Recognition as a Service to the users by using the AWS cloud resources.
Boro23-wq/AWS-Image-Recognition-Pipeline
An image recognition pipeline in AWS, using two parallel EC2 instances, S3, SQS, and Rekognition.
itsallaboutpython/Real-Time-Chat-Application
Vatshayan/Final-Year-Blockchain-Voting-System
Blockchain based electronic voting system with Code, PPT, synopsis, Report, Research papers and full video explanation. Blockchain Final Year Project
MaksimSamusev/Distributed-Voting-System
inforkgodara/sql-injection
It is a SQL injection vulnerable project with demonstration. It is developed using PHP and MySQL technologies. It also contains a youtube link where fully demonstrated SQL Injection.
yuanzhengxiong/Distributed-Voting
Distributed Voting System Based on Ethereum
TLDart/OnlineVoter
An Online voted using Distributed Systems
gcsilva11/DistributedSystems_2017-2018
Distributed system for voting across the internet.
alex20santos/sd
Distributed Systems project - Electronic voting system
Baro-coder/CSD_DVS
Computer Systems Diagnostics - Distributed Voting System
juanjo75es/igloovote
Distributed electronic voting system
mgrabina/Remote-Voting-System
Distributed voting system
riya-joshi-401/Ethereum-Blockchain-based-Electronic-Voting-System
A decentralized electronic voting system using blockchain which helps users to cast their votes using the web portal in an efficient and secure manner. It is decentralized and distributed which means that there’s no central authority over the voting system. Technology Stack: React.js, Truffle, Ganache, Metamask, Web3.js
jonahkall/blockchain-voting
A distributed blockchain-based voting system.
AhmedIssa11/Real-Time-Secure-Chat-Application
real-time secure chat application from scratch with end-to-end encryption
1N3/BlackWidow
A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
abdulkadir-gungor/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
susant146/CTuNLM_Image-Denoising
Multi-scale based Approach for Denoising Real-World noisy image using Curvelet Thresholding: Scope & Beyond
richardboo/Wavelet_Image_Denoising
Image Denoising using Wavelet Transform