1 | SQL Injection |
2 | DOS detection |
3 | Integrity checker |
4 | Chat Application |
5 | Intruder Detection System |
6 | Suspicious email Detection |
7 | Multi file upload System |
8 | Network Packet Sniffer |
9 | Web Vulnerability scanner |
10 | Linux Server Hardening |
11 | Network Traffic Monitoring System |
12 | Network Interface Scanner |
13 | Client Server Communication System |
14 | Network Bandwidth Monitoring System |
15 | Network Security Monitoring System |
16 | Advanced network scanner using Nmap |
17 | Data manipulation and analysis |
18 | Simple Malware Scanner using Yara |
19 | Advanced Network Packet Capturing Tool |
20 | Simple web vulnerability scanner |
21 | Caesar Cipher Encryption/Decryption |
22 | Text Encryption Using Cryptographic Algorithms |
23 | Web-Based Facial Authentication System |
24 | Network Anomalies Detection |
25 | File Type Identification using the Magic Number |
26 | Credit Card Encryption and Decryption |
27 | Keylogging (Spyware) |
28 | User Authentication System |
29 | Image Steganography System |