Skip to content

Providing World Class E-Learning Experince with Real world Internships

Notifications You must be signed in to change notification settings

20MH1A04H9/Prodigy_infoTech

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Logo

Prodigy_InfoTech

Welcome to ProdigyInfoTech's Cybersecurity Projects Repository!

Here you'll find a selection of unique initiatives I created during my internship, all aimed at addressing the ever-increasing difficulties of cybersecurity.

Tasks

  • Implement caesar cipher

  • Pixel Mainpulation for image Encryption

  • Password Complexity Checker

  • Simple Keylogger

  • Network Packet Analyzer

Code

Implement caesar cipher

Pixel Mainpulation for image Encryption

Password Complexity Checker

Simple Keylogger

Network Packet Analyzer

References:

The Caesar cipher is a simple encryption technique. It operates by moving the letters in the plaintext message by a predetermined number of positions, called as the "shift" or "key".

Here is an example of how to use the Caesar cipher to encrypt the message “HELLO” with a shift of 3: Write down the plaintext message: HELLO Choose a shift value. In this case, we will use a shift of 3. Replace each letter in the plaintext message with the letter that is three positions to the right in the alphabet.

     H becomes K (shift 3 from H)

     E becomes H (shift 3 from E)

     L becomes O (shift 3 from L)

     L becomes O (shift 3 from L)
  • Mainpulation for image Encryption Pixel manipulation is an innovative technique to image encryption that employs cryptographic algorithms and libraries such as NumPy and Pillow to substitute, permute, and disperse individual pixel values. This technology improves image security and is critical for securing digital information.

  • Password Complexity Checker The Cyber Security Agency of Singapore has created a checker that estimates the time it would take for cybercriminals to figure out a password. Passwords are not saved or stored; it is solely intended for instructional reasons.

  • Simple Keylogger A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific device, such as a computer or smartphone

Screenshots

Keylogger

  • Network Packet Analyzer A packet sniffer (also known as a packet analyzer, protocol analyzer, or network analyzer) is a piece of hardware or software that monitors network traffic. Sniffers examine streams of data packets that move between networked computers and the greater Internet. Wireshark

Support

Let's talk! I'd love to hear from you!, email contact@prodigyinfotech.dev

Logo

Releases

No releases published

Packages

No packages published

Languages