Are you looking for a master thesis or an internship? Here are some ideas...
AMC, for Auto Multiple Choice, is an open source software that allows a teacher to create multiple-choice tests in a very simple way. But, the most interesting part of AMC, is the ability to automatically correct the tests of all students.
Intrusion and Advanced Persistent Threat detection systems analyze daily enormous amounts of data. The evidences produced by such systems need to be presented in a clear and understandable way to an analyst so he/she can easily filter out important suspicious behavior and what is just regular network traffic. To do this an intuitive and readable visualization of the data must be present for the expert.
A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is usually to run network related exercises and tests.
A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is used to run network related exercises and tests.
A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is usually to run network related exercises and tests.
Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible. However, hydra is written in C, which means modifying the code can be challenging.
Garner is a mobile application repository that gathers application packages from the Apple App Store and Google Play Store and extracts useful information about them. Users can use Garner's web interface to
GitLab is a powerful source code management software that allows to manage the complete DevOps lifecycle: it offers code management with git, jobs and pipelines to test and deploy the code, operations monitoring and issue tracking to plan the next release.
Modern mobile devices produce a lot of network traffic, that can be hard to completely capture because of the multiple communication technologies used (Bluetooth, cellular network, wifi etc.)
Monitoring your servers is an important part of security. For this project you will contribute to the Monitoring 4 Security tool. This tool is composed of a web interface and a client agent that is installed on the monitored server. It has some differences compared to other monitoring solutions:
Programming Protocol-independent Packet Processors (P4) is a domain-specific language for network devices, specifying how data plane devices (switches, NICs, routers, filters, etc.) process packets.
OSINT, for Open Source Intelligence, is more and more essential and used in the security field. It is important to know the personal data, related to someone, available on the Internet.
Open wifi is quite common today. The danger is that a hacker may create a fake open wifi access point (AP) to capture user traffic. A tool called Snappy allows apparently to fingerprint wifi access points, so one can easily detect roge wifi access points.
Transport Layer Security (TLS) is building block for the security of communications over the Internet. TLS is used for securing http(s), DNS (DNS-over-TLS and DNS-over-HTTPS), emails and many more!
Online analysis tools such as VirusTotal are often used to upload suspicious files and analyze them. When trying to detect obfuscation techniques, it is often the case that we need to familiarize ourselves with them first. Most Advanced Persistent Threats hide their activity in such a way, that common analysis tools can’t figure out what a file does, before it is too late.