Skip to content
View cybersmeashish's full-sized avatar

Block or report cybersmeashish

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. network-intrusion-detection network-intrusion-detection Public

    A Python-based network intrusion detection system using machine learning algorithms to identify anomalous traffic patterns Technologies: Python, Scikit-learn, Pandas, Wireshark, Snort

  2. vuln-scanner vuln-scanner Public

    Custom vulnerability scanner that evaluates systems for common security misconfigurations and CVEs Technologies: Python, Nmap, Docker, SQLite

  3. secure-coding-examples secure-coding-examples Public

    Collection of examples demonstrating secure vs. insecure coding practices in various languages with explanations Technologies: Java, Python, JavaScript, C

  4. malware-analysis-toolkit malware-analysis-toolkit Public

    Tools for static and dynamic malware analysis in a controlled environment Technologies: Python, YARA rules, Cuckoo Sandbox

  5. ctf-writeups ctf-writeups Public

    Detailed walkthroughs of capture-the-flag challenges you've solved with methodology and lessons learned Technologies: Various based on challenges

  6. secure-infrastructure-templates secure-infrastructure-templates Public

    Infrastructure as code templates with security best practices built in