Exercise writeups from the book Practical Malware Analysis.
Linux dotfiles for user environment configuration.
Challenges written for OpenCTF @ Defcon.
Set up a personal IPSEC VPN in the cloud
Ansible roles for host provisioning.
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Hashing Algorithms along with example challenges from CTFs
Keep track of failed login attempts in Django-powered sites.
Dockerized apt-cacher-ng service.
commit sha a968bf425fb31f11ae4375fac2fc18099506360d
fix: requirements.dev.txt to reduce vulnerabilities The following vulnerabilities are fixed by pinning transitive dependencies: - https://snyk.io/vuln/SNYK-PYTHON-PYGMENTS-1086606 - https://snyk.io/vuln/SNYK-PYTHON-PYGMENTS-1088505
push time in a month
created branch time in a month