Giter Club home page Giter Club logo

Krypt Li's Projects

aby icon aby

ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation

acra icon acra

Database security suite for data-driven apps: database proxy with strong selective encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side encryption. Works for SQL databases and (limited functionality) for NoSQL databases.

advanced-wireshark-network-forensics icon advanced-wireshark-network-forensics

If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "Here's an ARP frame, here's an IP packet, here's a web request..." But what they don't go into is: when you open a Pcap file for the first time, where do you start? What are the things that you look for? And how do you find them? So my goal here is to help you bridge that gap between having a basic understanding of network protocol analyzers, and using them to solve real world problems.

aes-cpa icon aes-cpa

CPA (Correlation Power Analysis) attacks against the AES (Advanced Encryption Standard)

apricot icon apricot

APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers

arx icon arx

ARX is a comprehensive open source data anonymization tool aiming to provide scalability and usability. It supports various anonymization techniques, methods for analyzing data quality and re-identification risks and it supports well-known privacy models, such as k-anonymity, l-diversity, t-closeness and differential privacy.

avml icon avml

AVML - Acquire Volatile Memory for Linux

btle-sniffer icon btle-sniffer

Passively scan for Bluetooth Low Energy devices and attempt to fingerprint them

cenin icon cenin

An implementation of feed-forward phase of deep Convolutional Neural Networks in pure C#

chipwhisperer icon chipwhisperer

ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks

clusion icon clusion

A searchable encryption library from the Encrypted Systems Lab @ Brown University.

crime-detection--using-deep-learning icon crime-detection--using-deep-learning

Developed an object detection model using YOLO Darknet framework to prevent crimes. Collected the crime data manually from Google images as well as Imagenet database

cryptdb icon cryptdb

A database system that can process SQL queries over encrypted data.

crypto-tk icon crypto-tk

Cryptographic toolkit for searchable encryption.

cryptosl.github.io icon cryptosl.github.io

Github Pages template for academic personal websites, forked from mmistakes/minimal-mistakes

cylr icon cylr

CyLR - Live Response Collection Tool

datax-web icon datax-web

DataX集成可视化操作,支持页面配置JSON脚本,手动触发执行,实时查看运行日志,集成定时任务,支持分布式,支持运行记录浏览,kill运行进程。

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.