218 skills found · Page 2 of 8
MaheshShukla1 / Complete Networking Guide Osi Tcpip Subnetting SecurityThis repository covers computer networking fundamentals and advanced concepts including the OSI model, TCP/IP protocols, IP addressing & subnetting, NAT, VPNs, firewalls, IDS/IPS, network redundancy, and wireless security. Perfect for students, IT professionals, and certification candidates (CCNA, CompTIA Network+, AWS Networking, and Security+).
elfalehed / Hack4squad:skull: A versatile hacking framework that consolidates tools for OSINT, penetration testing, networking, auditing, and more, providing a comprehensive suite for cybersecurity professionals. Designed for flexibility and ease of use, it streamlines security assessments and vulnerability analysis.
harshilpatel1799 / IoT Network Intrusion Detection And Classification Using Explainable XAI Machine LearningThe continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection systems (IDSs). Over the last few years, IDSs for IoT networks have been increasing reliant on machine learning (ML) techniques, algorithms, and models as traditional cybersecurity approaches become less viable for IoT. IDSs that have developed and implemented using machine learning approaches are effective, and accurate in detecting networks attacks with high-performance capabilities. However, the acceptability and trust of these systems may have been hindered due to many of the ML implementations being ‘black boxes’ where human interpretability, transparency, explainability, and logic in prediction outputs is significantly unavailable. The UNSW-NB15 is an IoT-based network traffic data set with classifying normal activities and malicious attack behaviors. Using this dataset, three ML classifiers: Decision Trees, Multi-Layer Perceptrons, and XGBoost, were trained. The ML classifiers and corresponding algorithm for developing a network forensic system based on network flow identifiers and features that can track suspicious activities of botnets proved to be very high-performing based on model performance accuracies. Thereafter, established Explainable AI (XAI) techniques using Scikit-Learn, LIME, ELI5, and SHAP libraries allowed for visualizations of the decision-making frameworks for the three classifiers to increase explainability in classification prediction. The results determined XAI is both feasible and viable as cybersecurity experts and professionals have much to gain with the implementation of traditional ML systems paired with Explainable AI (XAI) techniques.
RickeyRen / Oracle Cloud Network Tester🌍 Professional network testing tool for Oracle Cloud's 24 global data centers. Features real-time CLI interface, web dashboard, and comprehensive latency analysis with intelligent region recommendations.
Matrix-Community-ORG / SSHCrackerA powerful (SSH Cracker) and efficient SSH connection testing tool written in Go. Features include multi-threaded testing, real-time progress monitoring, Discord webhook integration, and a robust license system. Perfect for network administrators and security professionals to test SSH connection security.
fzer0x / SentryRadioA professional Android forensic tool designed to detect, analyze, and map cellular network anomalies, including potential IMSI Catchers (Stingrays), cell site simulators, and suspicious network downgrades and Silent SMS.
Dharm3112 / IntelliCircleIntelliCircle is a location-based professional networking platform built with React and Express that facilitates real-time connections through interest-based chat rooms powered by WebSockets.
Hazrat-Ali9 / Brain Tumor Detection Data Science🤢 Brain 🥶 Tumor 🤡 Detection 🙉 Data 🤖 Science 🧑🌾 is a machine 🧑🎤 and deep ✈ learning 🛫 project 🚁 focused on 🚋 the early 🚟 detection of 🚀 brain tumors ⛱ using MRI 🚞 scans It 🏫 leverages 🚝 data workflows 🛼 computer 🛸 vision ⛴ and neural 🎳 networks to ⚽ assist 🥎 healthcare ⚾ professionals 🏀 in accurate 🏈 efficient 🎮 diagnosis
writememe / Day One Net ToolkitA toolkit used for network professionals who need to discover a new network
sergio11 / Nethawk AnalyzerNetHawk 🦅: An educational PoC combining 🤖 generative AI with 🛡️ ethical hacking and 🔍 network vulnerability assessment. Simplifying security scans & audits for 🎓 learners and 🌐 future cybersecurity professionals.
hegdepavankumar / Cisco Asa Firewall TrainingWelcome to our comprehensive Free Cisco ASA Firewall Training – the ultimate guide to mastering the art of network security. Whether you're a beginner looking to understand the basics or an experienced professional seeking advanced configurations, our hands-on course is tailored just for you.
EchoLinkTech / EchoLinkServiceProfessional Networking and Recruiting Service with Verified Info on Blockchain - LinkedIn on Blockchain
vidhipitroda / Patient Health Monitoring System IoT BasedIn IOT based monitoring project designed for keep on time track on the health status of the patient and updating to doctor at remote location anytime. With this effective device, health status of a critically ill patient can be constantly monitored. It can be used to keep track of health of aged people who frequently have heart or blood pressure issues. The IoT project developed here is built on Arduino UNO. It is interfaced with ESP8266 Wi-Fi modem to connect with an internet router and access the cloud server. The Arduino is interfaced with LM-35 temperature sensor to sense the body temperature and a pulse sensor to read pulse rate It continuously monitors the pulse rate and body temperature and updates them to an IoT platform. If any abnormalities are detected then system immediately sends notification to doctor. The IoT platform used in this project is ThingSpeak. Thingspeak has capabilities for Visualizing the collected data in the form of charts, Ability to create apps for collaborating with web services or social network and other APIs. The data from ThingSpeak to android application will send by HTTP request and HTTP response protocol. A threshold value is being set for pulse rate and body temperature. In android application there will be separate login credentials for patient and doctor. When the doctor will login, list of patients will be displayed along with two tags Patient Details and Health Status. In health status data from the Thingspeak will be fetched, doctor can check the medicine that the patient is consuming and can update is depending upon the health status. The patient can check the health status and medicine list and can also update details accordingly. Such a system consist of physiological data that stores, process and communicate through a local manner such as smart phones by using the system the health care professionals can monitor and advice their patient all the time.
omersayak / SocksHarvesterSocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.
christopharantony / PracticaA professional network application for job seekers to reach out to potential employers.
bangmaple / CCNP RoutingCisco Certificate Network Professional - Routing Section for studying with hands-on labs running on EVE-NG emulated environment.
easypro-tech / BrsBrabus Recon Suite (BRS) is a professional Linux toolkit for network reconnaissance and penetration testing. Modules: network discovery, port scanning, domain recon, vulnerability assessment, system info, and authorized attack tools. Timestamped results, clean TUI, quick start: ./main.sh.
deepblue597 / SixpathA self-hosted professional network visualization and management tool that helps you map and maintain your connections through an interactive graph interface.
Indrajith-S / Cybersecurity Analyst NotesWelcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Dive into detailed insights covering network security, incident response, threat intelligence, and more. Enhance your cybersecurity expertise as we learn together.
sergio11 / BlackvenomBlackVenom is a personal project designed for ethical ARP and DNS spoofing 🛡️. It helps cybersecurity professionals practice network traffic interception and vulnerability identification 📄, all while adhering to ethical hacking standards ⚖️. Ideal for learning and enhancing network security skills.