LogLLM: Log-based Anomaly Detection Using Large Language Models (system log anomaly detection)
- Updated
Dec 9, 2025 - Python
LogLLM: Log-based Anomaly Detection Using Large Language Models (system log anomaly detection)
Evading Provenance-Based ML Detectors with Adversarial System Actions
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] SEMESTER VI
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
Rubber Ducky is an awareness initiative focused on educating individuals and organizations about potential cybersecurity threats that can be delivered through USB devices, particularly targeting issues like ransomware, backdoors, and keyloggers. Leveraging the concept of Bad USB and the functionality of Rubber Ducky USBs.
A console-based application to securely manage a system of admins, service engineers, travelers and scooters.
Device-Security-Audit is a Python-based security audit tool that helps assess and enhance the security of your systems. It includes checks for Docker container vulnerabilities, rootkit detection, network traffic monitoring, and cloud and Kubernetes security. With customizable options and parallel task execution, it's simply the best.
🚀 Evaluate base LLMs' agent capabilities in software engineering and deep research with APTBench for efficient, predictive performance insights.
Professional Linux administration toolkit with system hardening, automation, and monitoring tools. Companion to "Linux Basics and Cheat Sheets" book.
A Privacy safe-guard app. To generate/save passwords and to generate fake identities.
This cross-platform app monitors file and directory changes, tracking creation, modification, deletion, and movement in real time. It features a user-friendly GUI, robust CLI, log management, import/export of watchlists, error resilience, and supports multiple directories for versatile use cases.
MSc in Computer Science UNIBZ. Free University of Bozen-Bolzano Python Java
These are just random experiments and practical programs written by me during college.
A Python-based Network Packet Analyzer with dashboard and suspicious traffic detection
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
Learn to Hack in a Hands-On fashion
🔒 Professional secure device wiping tool - permanent data destruction with intelligent algorithms and resume support
Add a description, image, and links to the system-security topic page so that developers can more easily learn about it.
To associate your repository with the system-security topic, visit your repo's landing page and select "manage topics."