alifa2try
I am a cyber security trainer and consultant who help students to acquire cyber security knowledge & skills and companies to secure their data.
Phoenyx AcademyKano, Nigeria
Pinned Repositories
awesome-cpp
A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
enhanced-argumentation-based-reasoner
Enhanced Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks"
h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
IoT_Project
This repo has been developed as part of the "Internt of Things" course at Politecnico di Milano. The project aims to design and implement a software prototype for a social distancing application using TinyOS, Node-RED and IFTTT.
Learn-Ethical-Hacking-from-Scratch
Learn Ethical Hacking from Scratch, published by Packt Publishing
mail-hunter
Mail Hunter is a tool that gathers e-mails from all the pages on a target website
Malicious-Python-3-Programming-for-Ethical-Hackers
Offensive Security Python scripts based on my course "Learn Ethical Hacking with Python 3 from Scratch" on Phoenyx Academy
master-thesis
My master thesis: Ethical hacking of a smart home alarm system.
phunter
Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the moment.
RPL_Attack_Files
This repo will contain modified files from Contiki 3.0 necessary to carry out RPL attacks.
alifa2try's Repositories
alifa2try/zamia-prolog
Embeddable Prolog dialect implemented in pure Python. Stores its knowlegdebase using SQLAlchemy for scalability.
alifa2try/WorldQuiz
World Quiz
alifa2try/code
ActiveState Code Recipes
alifa2try/Projects-Solutions
:pager: Links to others' solutions to Projects (https://github.com/karan/Projects/)
alifa2try/Mathematics-Computer-Aided-Instruction-
Mathematics Computer Aided Instruction Implemented using Visual Basic 2010
alifa2try/Python-How-To-Program
Solution to End of Chapter Exercises from Python How To Program by Deitel.
alifa2try/hello-world
My first project on github
alifa2try/Projects
:page_with_curl: A list of practical projects that anyone can solve in any programming language.
alifa2try/programming-techniques
alifa2try/DFRWS2018Challenge
DFRWS 2018 Challenge Page
alifa2try/CG-Accumulator
:fire: A console-based software to help accumulate CGPA / SGPA data and extract useful results for the students of IIT KGP.
alifa2try/django-by-example-book
Code for the book Django By Example https://www.packtpub.com/web-development/django-example
alifa2try/marseille
Mining Argument Structures with Expressive Inference (Linear and LSTM Engines)
alifa2try/Master---IDS
Code for the IDS.
alifa2try/iot-malware
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code
alifa2try/Mirai-Source-Code
Leaked Mirai Source Code - make it vagrantized
alifa2try/security-project-mirai
Running mirai botnet in lab environment
alifa2try/BASHLITE
An archive of BASHLITE source code
alifa2try/ecdh-curve25519-mobile
ECDH-Curve25519-Mobile implements Diffie-Hellman key exchange based on the Elliptic Curve 25519 for Android devices.
alifa2try/NLTKForumScraper
An argument extraction tool that scrapes medical treatment reviews from health forums and then mines the posts for arguments
alifa2try/millionaire-console
Who Wants to Be a Millionaire console game in Python
alifa2try/dns_detection
Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration
alifa2try/scratch
alifa2try/irss2014-argument-extraction
Code and data for ARG-MINING 2015 paper: Argument Extraction from News
alifa2try/NFWorkshop
Network Forensics Workshop Files
alifa2try/contiki_rpl
Source code from my master thesis on 'A performance evaluation of rpl in contiki', presented at BTH Sweden in 2012.
alifa2try/CaesarCipher
Implementation of a Caesar cipher, both encoding and decoding. The key is an integer from 1 to 25. This cipher rotates the letters of the alphabet (A to Z). The encoding replaces each letter with the 1st to 25th next letter in the alphabet (wrapping Z to A). So key 2 encrypts "HI" to "JK", but key 20 encrypts "HI" to "BC".
alifa2try/Who-Wants-to-Be-a-Millionaire
A simple client side web application(JS, HTML5, CSS) that plays a game of Who Wants to Be a Millionaire
alifa2try/P2P-chat-application
A python program which acts as a P2P chat application, created using Sockets and Tkinter
alifa2try/pysis
Student Information System, developed with Django and Python