Spam mail classification involves sorting emails into categories like promotional, phishing, or malicious ??. It uses algorithms to analyze content, sender reputation, and user behavior to determine if an email is unwanted ??. Effective classification helps reduce inbox clutter and protects users from potential threats ??. I have created a Spam mail classification model using Support Vector Machine. It has an accuracy of 98.5%. Check the Github link below. Github link: https://lnkd.in/etFkvvT4
Harivenkat R的动态
最相关的动态
-
Vulnerabilities like LFI and RFI continue to pose significant dangers to online applications as cyber threats evolve. Here is a brief summary of these vulnerabilities and my experience testing them with a Node.js application. ?? What are LFI and RFI? - LFI (Local File Inclusion): Allows attackers to manipulate applications to load unintended local files. This can expose sensitive server files and, in some cases, lead to code execution. - RFI (Remote File Inclusion): Allows files from external sources to be included, presenting a greater risk by potentially enabling the execution of malicious code from remote servers. ?? Why are These Vulnerabilities Concerning? Both vulnerabilities can lead to: Data Exposure: Attackers may gain access to configuration files, credentials, or private data. Code Execution: RFI, in particular, can allow remote code execution, potentially leading to a full system compromise. ?? My Work on LFI/RFI Testing To deepen my understanding of these vulnerabilities, I’ve been developing an LFI/RFI scan tool (daijin V2) and a Node.js test app. Although still in progress, these tools have already provided insights into how simple mistakes can lead to exposure. You can view the repository on GitHub: https://lnkd.in/eFRwp2-7 ?? Securing Applications Against LFI and RFI: - Sanitize Inputs: Thoroughly validate inputs, especially those affecting file paths. - Limit File Access: Only expose files essential for the application. Environment-Specific Configurations: Use different configurations for development and production to limit unintended exposure. - Restrict Directory Access: Prevent directory traversal to avoid accidental exposure of sensitive directories. ??? Next Steps As I continue improving the tool and app, I'll keep expanding my knowledge of secure file handling practices. Web security is constantly evolving, and hands-on projects like this one offer essential insights into mitigating emerging risks.
GitHub - Eve-SatOrU/daijin-V2: daijin again :)) but with other thing
github.com
要查看或添加评论,请登录
-
?? Week 3 Recap: My Journey with Digital Egypt Pioneers Initiative - DEPI?? Track: Vulnerability Analyst / Penetration Tester Excited to share my progress as I continue exploring the dynamic world of cybersecurity, focusing on practical learning and threat analysis! This week, I dived deep into the realm of malware, learning about its diverse types, propagation methods, and impacts on systems. My research uncovered fascinating insights into these categories: ?? Viruses – Corrupting data and disrupting operations (e.g., ILOVEYOU Virus). ?? Worms – Self-replicating threats that exploit network vulnerabilities (e.g., WannaCry). ?? Trojan Horses – Disguised as legitimate tools, often used for data theft (e.g., Zeus Trojan). ?? Ransomware – Encrypting files and demanding ransom (e.g., CryptoLocker). ?? Spyware – Conducting stealthy surveillance and data exfiltration (e.g., FinSpy). To complement my theoretical learning, I engaged in hands-on TryHackMe challenges, tackling real-world scenarios such as: ? Phishing Emails in Action – Recognizing red flags in phishing attempts. ? Common Attacks – Analyzing cyberattacks and exploring defensive strategies. ? SDLC & SSDLC – Integrating security into every phase of the development lifecycle. These experiences reinforced the critical importance of proactive defense strategies in today’s rapidly evolving threat landscape. ?? A big thank you to the amazing resources, mentors, and platforms that make this journey so impactful, helping me bridge the gap between theory and practice! #Cybersecurity #MalwareAnalysis #TryHackMe #NetworkingAndSecurity #ContinuousLearning
GitHub - Youssefhamdi1/DEPI-WEEK3
github.com
要查看或添加评论,请登录
-
?? Excited to share my latest project: SSH-IDS! ?? I've developed a Intrusion Detection System tailored for SSH connections, and I'm thrilled to share the code with the community. SSH-IDS is designed to enhance security by monitoring and identifying multiple failed SSH connection attempts, automatically blocking offending IP addresses using iptables after a predefined number of failed attempts. SSH-IDS sends real-time email notifications, including the blocked IP address and its geographical location. The project utilizes cron jobs to automatically unblock IP addresses after an hour, ensuring minimal disruption. The system collects and logs various events from the auth.log file for detailed monitoring and analysis. Additionally, SSH-IDS includes an interactive console for managing the IDS, listing blocked IPs, and unblocking IPs as needed. Technically, SSH-IDS works as follows: Log Parsing: The script continuously parses the auth.log file to detect failed SSH login attempts based on predefined patterns. If multiple failed attempts are detected from the same IP address, the IP is blacklisted. IP Blocking: IP addresses are blocked using iptables. The script checks the current iptables rules to ensure the IP isn't already blocked before adding a new rule. Email Notifications: Real-time email alerts are sent using the smtplib library. These emails include the blocked IP address and its geographical location, obtained using the IP2Location library. Dynamic Unblocking: Cron jobs are used to automatically unblock IP addresses after one hour. This is achieved by logging the block timestamp and periodically checking for expired blocks. Interactive Console: A user-friendly console provides options to start/stop the IDS, list currently blocked IPs, and manually unblock specific IPs. The console is designed to be intuitive and easy to use, featuring animated welcome messages and color-coded output. Geolocation Lookup: The IP2Location library is used to fetch geographical details of blocked IP addresses, such as country, region, and city, enhancing the threat analysis process. I'm continuously working on adding more features and incorporating advanced detection techniques to improve the system. If you find any issues, please let me know, and I'll address them promptly. Check out the code and feel free to provide feedback or suggestions! ?? https://lnkd.in/eVWvshhg #CyberSecurity #SSH #IntrusionDetection #TechInnovation #ProjectShare #OpenSource #NetworkSecurity
GitHub - git-prabhakar/SSH-IDS
github.com
要查看或添加评论,请登录
-
Sharpshooter was a tool I made use of for a while, so it was exciting to find this updated fork of it. The original tool was definitely in need of an update. https://lnkd.in/dmF-wNrr #cybersecurity #hacking #pentesting #offensivesecurity
GitHub - SYANiDE-/SuperSharpShooter: Payload Generation Framework
github.com
要查看或添加评论,请登录
-
Hello everyone and welcome back again, I am happy to share my first web application assessment in this application I could find dangerous vulnerabilities such as -SQL Injection - File Upload vulnerability -Stored XSS -Reflected XSS -Dom XSS -SSRF -Broken Access Control -Authentication Vulnerability -Directory Traversal - Method Tampering -IDOR - Cryptographic Failures you can find my report here https://lnkd.in/d5P6xB22 here is the web application and how to use it https://lnkd.in/demyV6h2 finally, here is my playlist explaining most of the common web application vulnerabilities (OWASP?top 10 ) with practical labs on portswigger,hope it helps you to find your way ?? https://lnkd.in/dwU6eqRV #Pentesting #CyberSecurity #NetworkSecurity #WebApplicationPentesting
GitHub - ramyvictor12/WebAppPentesting
github.com
要查看或添加评论,请登录
-
?? Elevating my Web Pentesting Journey: Updates from the Obsidian Vault ?? Hey LinkedIn fam! ???? Excited to share some fresh additions to my digital treasure trove, the Obsidian Vault! ?? It's been a thrilling journey diving deeper into the realms of cybersecurity, and I'm eager to unveil the latest insights and methodologies that I've curated. ?? New Additions: API Pentesting Insights: Delving into the fascinating world of API security, I've compiled notes from the exceptional book "Hacking APIs" by Corey Ball. Unveil the nuances of API vulnerabilities and strategies to uncover them as we explore this critical aspect of modern web security. ???? Android Pentesting Primer: Introducing a brand-new section dedicated to Android Pentesting! ?? Dive into the depths of mobile security with two comprehensive categories: Pre-Knowledge: Gain insights into foundational concepts essential for understanding Android security. Testing (Dynamic and Static Analysis): Explore detailed notes from eMPT and Attify courses, along with insights from MASTG_OWASP, to master the art of analyzing Android applications for vulnerabilities. ?? Continual Evolution: As always, the Obsidian Vault is a living repository, constantly evolving to stay ahead of emerging threats and techniques. Stay tuned for ongoing updates, including deep dives into API vulnerabilities and advanced Android Pentesting methodologies. ?? ?? Collaborative Learning: Let's make the Obsidian Vault a collaborative hub for knowledge exchange! ?? Whether you have thoughts to share on API security, Android Pentesting, or any other aspect of cybersecurity, drop a comment and let's ignite a dialogue. Together, we can fortify our skills and contribute to a more secure digital landscape. ?? ??? Join the Cybersecurity Crusade: Calling all fellow bug bounty warriors! ??? Let's connect, share experiences, and empower each other to tackle the ever-evolving challenges of cybersecurity. Whether you're a seasoned pro or just starting out, there's strength in unity as we strive to safeguard the online world. ?? Excited to embark on this journey of continuous improvement and knowledge sharing! Let's collaborate, innovate, and make the internet a safer place, one vulnerability at a time. ???? #WebPentesting #BugBounty #ObsidianVault #CybersecurityJourney #InfoSec https://lnkd.in/dw-YcX7D
GitHub - moTorky/tips-mindmap
github.com
要查看或添加评论,请登录
-
I am thrilled to share that I have developed a simple yet effective code PoC for two critical vulnerabilities: #CVE-2024-24919 #CVE-2024-4956. You can find the code on my GitHub repository here: https://lnkd.in/d9mcKHTA This PoC aims to help originations to identify and mitigate exposure to these vulnerabilities in their internet-facing assets and endpoints. If you are responsible for securing your organization's infrastructure, this tool can assist in assessing your risk and taking appropriate measures. What does the PoC do? Identifies assets exposed to the internet that might be vulnerable. Checks if any of your endpoints are susceptible to these specific CVEs. #CyberSecurity #VulnerabilityManagement #InfoSec #CVE2024 #SecurityResearch #GitHub #CyberAwareness #NetworkSecurity #EthicalHacking #TechInnovation
GitHub - Mrnmap/NewCVE
github.com
要查看或添加评论,请登录
-
Week 3 Recap: My Digital Egypt Pioneers Initiative - DEPI Journey in Vulnerability Analysis & Penetration Testing I’m thrilled to share my Week 3 highlights as part of the Digital Egypt Pioneers Initiative! This week was packed with insightful discoveries about malware and its impact on cybersecurity, enhancing my skills in identifying and analyzing threats. My focus revolved around understanding different malware types, how they operate, and their real-world implications. Key insights include: -Viruses: Malicious programs that damage systems and disrupt workflows (e.g., Melissa Virus). Worms: Self-replicating entities exploiting vulnerabilities to spread rapidly -(e.g., Stuxnet). -Trojans: Deceptive programs posing as legitimate tools to enable unauthorized access (e.g., Emotet). -Ransomware: Malware encrypting critical data, demanding payment for recovery (e.g., Ryuk Ransomware). -Spyware: Stealthy software gathering sensitive information unnoticed (e.g., DarkComet). I also put theory into practice with TryHackMe challenges, exploring cybersecurity scenarios such as: -Spotting Phishing Attempts: Identifying deceptive tactics and sharpening ----phishing detection skills. -Defending Against Attacks: Examining diverse attack methods and building robust defenses. -Secure Coding Practices: Gaining insights into SDLC and SSDLC to enhance software security at every stage. These practical exercises solidified my understanding of proactive defense strategies, emphasizing the need for vigilance in a constantly evolving threat landscape. #Cybersecurity #MalwareAnalysis #TryHackMeChallenges #SDLC #KeepLearning #depi
GitHub - mazen14125/DEPI-Week-3
github.com
要查看或添加评论,请登录
-
I'm happy to share that I've developed my very first tool for #subdomain enumeration! ?? As a passionate #cybersecurityenthusiast, creating this tool has been an incredible learning experience for me. I'm excited to see how it can benefit others in their security assessments. If you're involved in cybersecurity or interested in enhancing your domain #reconnaissance, I invite you to give it a try and share your feedback. Your insights will be invaluable as I continue to refine and improve this tool. Let's connect and collaborate for a safer online environment! ?? #Cybersecurity #SubdomainEnumeration #ToolDevelopment #InfoSec #FeedbackWelcome #cappriciosec
GitHub - AwakenDoldsoul2/DSubdomain
github.com
要查看或添加评论,请登录
-
Week 3 at Digital Egypt Pioneers Initiative - DEPI– Vulnerability Analyst/Penetration Tester Track This week, I worked on key topics like common attacks, email phishing, malware analysis, SDLC, and SSDLC, and uploaded my work to GitHub. Check it out here: https://lnkd.in/d-MGEDyb #Cybersecurity #PenetrationTesting #VulnerabilityAnalysis
GitHub - Mohamed-Adel-Mohamed/DEPI-WEEK3
github.com
要查看或添加评论,请登录