| 1 | SQL Injection |
| 2 | DOS detection |
| 3 | Integrity checker |
| 4 | Chat Application |
| 5 | Intruder Detection System |
| 6 | Suspicious email Detection |
| 7 | Multi file upload System |
| 8 | Network Packet Sniffer |
| 9 | Web Vulnerability scanner |
| 10 | Linux Server Hardening |
| 11 | Network Traffic Monitoring System |
| 12 | Network Interface Scanner |
| 13 | Client Server Communication System |
| 14 | Network Bandwidth Monitoring System |
| 15 | Network Security Monitoring System |
| 16 | Advanced network scanner using Nmap |
| 17 | Data manipulation and analysis |
| 18 | Simple Malware Scanner using Yara |
| 19 | Advanced Network Packet Capturing Tool |
| 20 | Simple web vulnerability scanner |
| 21 | Caesar Cipher Encryption/Decryption |
| 22 | Text Encryption Using Cryptographic Algorithms |
| 23 | Web-Based Facial Authentication System |
| 24 | Network Anomalies Detection |
| 25 | File Type Identification using the Magic Number |
| 26 | Credit Card Encryption and Decryption |
| 27 | Keylogging (Spyware) |
| 28 | User Authentication System |
| 29 | Image Steganography System |