Internships

Are you looking for a master thesis or an internship? Here are some ideas...

Auto Multiple Choice (AMC) with elimination testing

AMC, for Auto Multiple Choice, is an open source software that allows a teacher to create multiple-choice tests in a very simple way. But, the most interesting part of AMC, is the ability to automatically correct the tests of all students.

Read more

Big Data Visualization with d3.js

Intrusion and Advanced Persistent Threat detection systems analyze daily enormous amounts of data. The evidences produced by such systems need to be presented in a clear and understandable way to an analyst so he/she can easily filter out important suspicious behavior and what is just regular network traffic. To do this an intuitive and readable visualization of the data must be present for the expert.

Read more

Cyber Range : Comparison

A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is usually to run network related exercises and tests.

Read more

Cyber Range : Framework

A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is used to run network related exercises and tests.

Read more

Cyber Range : Scenarios

A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is usually to run network related exercises and tests.

Read more

Dokos (Py-Hydra)

Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible. However, hydra is written in C, which means modifying the code can be challenging.

Read more

Garner

Garner is a mobile application repository that gathers application packages from the Apple App Store and Google Play Store and extracts useful information about them. Users can use Garner's web interface to

Read more

GitLab monitoring and security

GitLab is a powerful source code management software that allows to manage the complete DevOps lifecycle: it offers code management with git, jobs and pipelines to test and deploy the code, operations monitoring and issue tracking to plan the next release.

Read more

Mobile device capture case

Modern mobile devices produce a lot of network traffic, that can be hard to completely capture because of the multiple communication technologies used (Bluetooth, cellular network, wifi etc.)

Read more

Monitoring 4 Security

Monitoring your servers is an important part of security. For this project you will contribute to the Monitoring 4 Security tool. This tool is composed of a web interface and a client agent that is installed on the monitored server. It has some differences compared to other monitoring solutions:

Read more

Network security using the P4 language

Programming Protocol-independent Packet Processors (P4) is a domain-specific language for network devices, specifying how data plane devices (switches, NICs, routers, filters, etc.) process packets.

Read more

OSINT : Maltego

OSINT, for Open Source Intelligence, is more and more essential and used in the security field. It is important to know the personal data, related to someone, available on the Internet.

Read more

Rogue wifi AP detection with Snappy

Open wifi is quite common today. The danger is that a hacker may create a fake open wifi access point (AP) to capture user traffic. A tool called Snappy allows apparently to fingerprint wifi access points, so one can easily detect roge wifi access points.

Read more

TLS Fuzzing

Transport Layer Security (TLS) is building block for the security of communications over the Internet. TLS is used for securing http(s), DNS (DNS-over-TLS and DNS-over-HTTPS), emails and many more!

Read more

VirusTotal obfuscation

Online analysis tools such as VirusTotal are often used to upload suspicious files and analyze them. When trying to detect obfuscation techniques, it is often the case that we need to familiarize ourselves with them first. Most Advanced Persistent Threats hide their activity in such a way, that common analysis tools can’t figure out what a file does, before it is too late.

Read more

This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept