Pinned Repositories
AES-CBC-Padding-Attack
Golang programs for AES -CBC mode encryption with HMAC-SHA256 and Padding Oracle attack on AES-CBC mode.
AES-CTR-Padding-Attack
Golang programs for AES-CTR mode encryption with 2 different hashing algorithm and Padding Oracle attack on AES-CTR mode.
AR-Cloud-Privacy
Now the worlds largest companies and organizations are racing to create the required AR Cloud infrastructure, to build and fuel these systems. This is where we will face unprecedented challenges and risks to privacy and individuals rights and freedom if we do not actively and mindfully seek to address the possible issues. AR- Cloud is a cloud infrastructure, by understanding how it uses cloud computing and it’s features and functionality, we can realize the possible security issues and privacy risk for this infrastructure and try to address them.
Buffer-Overflow-Attack-Adventure
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
Digital-Forensics-Report
This is a Forensics Report made after a thorough digital examination of the Jeans Case Evidence Image.
Docker-Mutiple-Containers
Exposing several ports unnecessarily can be a security risk, by exposing ports there will be a channel for unsecured communications and unrestricted traffic. By creating a special networks for the containers to share, the host is isolated from the multiple containers utilized.
Enigma-M4-Cryptanalysis
Cryptanalysis of Enigma M4 in Go Lang with pure statistical means utilizing Index of Coincidence and Trigram analysis.
Format-String-Vulnerability-Angband
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
Suricata-Detect-DoS-Attack
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Vehicular-Heatstroke-Alerting-System
Vehicular heatstroke, hyperthermia. The devastating effects of a child being left in a hot car. It's every parent's unfathomable nightmare, yet it happens several times a year. This is a project that provides a solution to this occurrence.
arvindpj007's Repositories
arvindpj007/Suricata-Detect-DoS-Attack
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
arvindpj007/Buffer-Overflow-Attack-Adventure
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
arvindpj007/Digital-Forensics-Report
This is a Forensics Report made after a thorough digital examination of the Jeans Case Evidence Image.
arvindpj007/Docker-Mutiple-Containers
Exposing several ports unnecessarily can be a security risk, by exposing ports there will be a channel for unsecured communications and unrestricted traffic. By creating a special networks for the containers to share, the host is isolated from the multiple containers utilized.
arvindpj007/AES-CBC-Padding-Attack
Golang programs for AES -CBC mode encryption with HMAC-SHA256 and Padding Oracle attack on AES-CBC mode.
arvindpj007/AES-CTR-Padding-Attack
Golang programs for AES-CTR mode encryption with 2 different hashing algorithm and Padding Oracle attack on AES-CTR mode.
arvindpj007/Enigma-M4-Cryptanalysis
Cryptanalysis of Enigma M4 in Go Lang with pure statistical means utilizing Index of Coincidence and Trigram analysis.
arvindpj007/AR-Cloud-Privacy
Now the worlds largest companies and organizations are racing to create the required AR Cloud infrastructure, to build and fuel these systems. This is where we will face unprecedented challenges and risks to privacy and individuals rights and freedom if we do not actively and mindfully seek to address the possible issues. AR- Cloud is a cloud infrastructure, by understanding how it uses cloud computing and it’s features and functionality, we can realize the possible security issues and privacy risk for this infrastructure and try to address them.
arvindpj007/Format-String-Vulnerability-Angband
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
arvindpj007/Secure-IoT-Healthcare-Device
The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project illustrates a process for identifying a vulnerability and proposes a solution for mitigating the same.
arvindpj007/GCP-Event-Countdown-Application
This is an application that utilises google cloud platform that does event management. There are protection again CSRF attacks.
arvindpj007/Reverse-Engineering-CISCO-OpenConnect
The task was to reverse engineer an open-source software and a custom binary using various diagnostic tools and security assessment techniques.
arvindpj007/Vehicular-Heatstroke-Alerting-System
Vehicular heatstroke, hyperthermia. The devastating effects of a child being left in a hot car. It's every parent's unfathomable nightmare, yet it happens several times a year. This is a project that provides a solution to this occurrence.
arvindpj007/GPS-spoofing
Understanding GPS spoofing and mitigation strategy to develop a novel mitigation strategy.
arvindpj007/Threat-Modeling-CISCO-OpenConnect
Threat modeling of an open-source VPN Client - OpenConnect using Microsoft Threat Modeling Tool
arvindpj007/Configure-Network-Components
The repository contains configuring various network components and application of its associated security in it.
arvindpj007/Cryptanalysis
The repository is a collection of repositories that performs various cryptanalysis attacks.
arvindpj007/Software-Vulnerability-Analysis
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
arvindpj007/Citadel-Email-Server-Setup
This application sets up the citadel email server (citadel suite) on the RPI4B in a docker container and allows different users to communicate with each other through server using a browser. The browser is placed in the client machine (on the VM) which is connected to the server in the same LAN.
arvindpj007/GPStracker
A location based android application to track a group of members. This can be used for tracking children.
arvindpj007/Roll-A-Ball-Game
This is a simple Rolling Ball game created using Unity hub and utilizes C# programming language.
arvindpj007/Diffie-Hellman-Key-Exchange
Go program that implements the Diffie-Hellman key exchange protocol at a 1024-bit key strength, this consists of parameter generation, share exchange, and key derivation.
arvindpj007/practicalcrypto
arvindpj007/PROGRAM-MODULE-AND-SOFTWARE-COPYRIGHT-PROTECTION-ELIGIBILITY
In this digital age where the copyright protection for program modules and software seems to be growing narrower due to Fair use and Merger doctrine. It would be better that software is considered as another section altogether due to its aspect of functionality.
arvindpj007/Breaking-Diffie-Hellman
This problem will implement two discrete logarithm programs that can break Diffie-Hellman at various key strengths.
arvindpj007/Business-Maturity-And-Cybersecurity
The cybersecurity leadership maturity for a company defines how it responds to cybersecurity threats and issues. The higher the maturity state, the stronger the company is in the cybersecurity front. This paper attempts to find whether there is a correlation between this business maturity and cybersecurity table-top exercises.
arvindpj007/C-Static-Analysis
arvindpj007/Elgamal-Public-Key-Encryption-Scheme
This Elgamal variant will use a hash function (SHA256) to compute a key for the AES-GCM encryption scheme.
arvindpj007/Healthcare-Industry-Risk-Management-Analysis
Healthcare Industry Risk Management Analysis focusing on HIPAA data and protocols.
arvindpj007/The-Authors-Guild-et-al-v.-Google-Inc.-Appellate-Opinion-Analysis
Authors Guild v. Google was a copyright case heard between 2005 and 2015. This paper attempts to analyze this appellate decision focusing more on the Cybersecurity aspects of the case.