LogLLM: Log-based Anomaly Detection Using Large Language Models (system log anomaly detection)
-
Updated
Dec 9, 2025 - Python
LogLLM: Log-based Anomaly Detection Using Large Language Models (system log anomaly detection)
Evading Provenance-Based ML Detectors with Adversarial System Actions
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] | TE Semester VI | Computer Engineering
Python-based keylogger for ethical use, capturing keystrokes and emailing logs. Features include retry logic for email delivery, log file management, and cross-platform support (Windows/Linux). Configurable for auto-start via systemd or Startup folder. Designed for educational purposes, penetration testing with consent, and self-monitoring.
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Rubber Ducky is an awareness initiative focused on educating individuals and organizations about potential cybersecurity threats that can be delivered through USB devices, particularly targeting issues like ransomware, backdoors, and keyloggers. Leveraging the concept of Bad USB and the functionality of Rubber Ducky USBs.
A console-based application to securely manage a system of admins, service engineers, travelers and scooters.
Learn to Hack in a Hands-On fashion
Python ransomware simulator for EDR testing. Encrypts, exfiltrates, and communicates via C2 β built for redβteam cyber defense validation.
π Evaluate base LLMs' agent capabilities in software engineering and deep research with APTBench for efficient, predictive performance insights.
Device-Security-Audit is a Python-based security audit tool that helps assess and enhance the security of your systems. It includes checks for Docker container vulnerabilities, rootkit detection, network traffic monitoring, and cloud and Kubernetes security. With customizable options and parallel task execution, it's simply the best.
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
A Python-based Network Packet Analyzer with dashboard and suspicious traffic detection
Professional Linux administration toolkit with system hardening, automation, and monitoring tools. Companion to "Linux Basics and Cheat Sheets" book.
This cross-platform app monitors file and directory changes, tracking creation, modification, deletion, and movement in real time. It features a user-friendly GUI, robust CLI, log management, import/export of watchlists, error resilience, and supports multiple directories for versatile use cases.
WebGeeks SystemShield is a lightweight security and system auditing application designed to help users understand what may be putting their computer at risk. SystemShield reviews system settings, installed software, browser versions, network configuration, and security features, then presents the results in a clear browser-based dashboard.
π Professional secure device wiping tool - permanent data destruction with intelligent algorithms and resume support
π οΈ Master assembly reverse engineering with tools, examples, and challenges across multiple architectures to enhance your skills and understanding.
These are just random experiments and practical programs written by me during college.
Add a description, image, and links to the system-security topic page so that developers can more easily learn about it.
To associate your repository with the system-security topic, visit your repo's landing page and select "manage topics."