Projects in Awesome Lists by Priyabug
A curated list of projects in awesome lists by Priyabug .
https://github.com/priyabug/deployment-and-prevention-of-threats-with-google-cloud-ngfw-enterprise
Explored the deployment and usage of Google Cloud Firewall Plus, a native Google Cloud service integrated with Palo Alto Networks' Threat Prevention technologies.
configuration-management firewall-management firewall-template google-cloud-platform iam load-balancer ngfw-configuration security security-tools terraform virtual-machine
Last synced: 15 Mar 2025
https://github.com/priyabug/vulnerabilities-in-the-tcp-ip-protocol
Here we explore several security weaknesses in the TCP/IP stack, demonstrating how attackers exploit protocol flaws and how to implement countermeasures. This includes simulations, analysis of common attack techniques, and security best practices to mitigate threats.
cookiesession hijacking-methods syn tcp tcp-client tcp-server tcp-socket
Last synced: 15 Mar 2025
https://github.com/priyabug/virtual-private-network---ip-tunneling-and-routing
Virtual Private Network (VPN) enables secure communication over public or untrusted networks by encrypting traffic and routing it through a secure tunnel exploring VPN implementations, IP tunneling techniques, and routing mechanisms, demonstrating how VPNs establish secure connections and how traffic is managed across different network environments
router routing tunneling vpn vpn-client vpn-server
Last synced: 15 Mar 2025
https://github.com/priyabug/cross-site-request-forgery-vulnerability-exploration
Last synced: 15 Mar 2025
https://github.com/priyabug/cisco-asa-high-availability-ha-failover-configuration
This project contains configurations and guides for setting up Cisco ASA firewalls in various network environments. It includes detailed steps for implementing High Availability (HA) failover, stateless and stateful failover, access control lists (ACLs), ICMP inspection, routing, and interface settings.It includes troubleshooting and verification
active-standby administrator-privileges cisco-asa cisco-ios esxi-vmware eve-ng firewall-rules gns3 high-availability high-availability-address network-address-translation virtual-private-network vmware-workstation
Last synced: 31 Jul 2025
https://github.com/priyabug/launching-bgp-network-on-one-of-the-autonomous-system
BGP exploration and the process of setting up a BGP network within an Autonomous System (AS), including BGP configuration, route advertisement, and path selection mechanisms. It covers real-world BGP implementations, security best practices, and network optimizations to enhance routing efficiency and prevent common vulnerabilities.
as-180 bgp bgp-configuration bgp-daemon bgp-router ebgp ibgp pathselection update
Last synced: 15 Mar 2025
https://github.com/priyabug/local-attacks-on-dns-server
This project provides hands-on simulations of DNS security threats, demonstrating how attackers exploit weaknesses in DNS resolution and how to mitigate these risks. By analyzing real-world attack scenarios and defensive measures, this project helps in understanding the significance of secure DNS configurations and encryption (DNSSEC),
dns-over-https dns-record dns-server dnscrypt scapy spoofing
Last synced: 15 Mar 2025
https://github.com/priyabug/cross-site-scripting-simulation-elgg
To protect web applications from XSS attacks simulations, detection techniques, and prevention strategies helping developers and security professionals understand and defend against XSS vulnerabilities.
Last synced: 15 Mar 2025
https://github.com/priyabug/implemented-arp-cache-manipulation-to-identify-and-analyze-network-vulnerabilities.
This analysis focuses on ARP cache manipulation techniques to assess network security risks and analyze vulnerabilities. By modifying ARP tables, we can simulate real-world attack scenarios, study their impact, and implement countermeasures.
arp mitm-attacks scapy sniffing-spoofing
Last synced: 15 Mar 2025
https://github.com/priyabug/implementation-and-setting-up-a-single-firewall-on-a-network
Last synced: 15 Mar 2025
https://github.com/priyabug/web-application-sql-injection-lab
This repository contains a hands-on lab for understanding SQL Injection attacks and their mitigations. SQL Injection is a critical vulnerability that allows attackers to manipulate database queries and access sensitive data.
container database docker mysql php sql sqlinjectionattack vulnerability-detection web webapplicationcontainer
Last synced: 27 Mar 2025
https://github.com/priyabug/building-ai-powered-applications-with-the-podman-ai-lab
Podman AI Lab is an open-source extension for Podman Desktop that allows you to work with LLMs ( Large Language Models ) in a local environment. From getting started with AI and experimenting with models and prompts to model serving and playgrounds for common generative AI use cases, Podman AI Lab enables you integration AI into your application
ai-environments ai-lab-container ai-lab-extension cloud containerized-applications deep-learning jupyter-notebook lightweight machine-learning native-cloud-technologies podman-desktop python3 tensor-flow testing
Last synced: 03 Mar 2025
https://github.com/priyabug/return-to-libc-attack-lab
The goal of this lab is to provide hands-on experience with a unique variant of the **buffer-overflow attack** that can bypass existing protection mechanisms in major Linux operating systems.
buffer-overflow compiler critical-vulnerabilities debugger gdb linux linux-kernel malicious-code malicious-shellcode ubuntu2004
Last synced: 10 Apr 2025
https://github.com/priyabug/icmp-redirect-attack-lab
Demonstrates the execution and impact of an ICMP Redirect Attack, focusing on how attackers can manipulate routing to hijack network traffic.
icmp icmp-redirect ip-protocol mitm-attacks python3 redirection routing show-ip-route ubuntu windows11
Last synced: 22 Feb 2025
https://github.com/priyabug/network-traffic-analysis-and-manipulation
Network Traffic analysis is a crucial aspect of network security and network management, enabling the monitoring, inspection, and interpretation of data packets flowing across a network.
capture-icmp capture-icmp-packet raw-sockets scapy sniffing spoofing spoofing-attack traceroute
Last synced: 19 Jul 2025
https://github.com/priyabug/small-office-home-office-network-design-implementation
Small Office Home Office Network Design Implementation
cisco-routers-and-switches configuration inter inter-vlan-routing layer-2 layer-3 network-testing vlan wireless-networking
Last synced: 28 Jun 2025
https://github.com/priyabug/cisco-asa-firewall-basic-configuration
Cisco ASA Firewall Configuration
authetication cisco-asa dmz-zone hostname inside-zone intrusion-prevention-system outside-zone security-levels virtual-private-network
Last synced: 28 Jun 2025
https://github.com/priyabug/design-and-implementation-of-a-simple-network
Design a network in Cisco Packet Tracer to connect the ACCOUNTS and DELIVERY departments, implementing best practices in cabling, IP addressing, and testing.
connectivity connectivity-testing crossover-cable ip-address-planning ip-addressing ip-configuration ping router-interface-configuration straight-through-cable subnetting traceroute troubleshooting
Last synced: 28 Jun 2025
https://github.com/priyabug/long-haul-dwdm-fiber-network-design-using-cisco-optical-network-planner
Last synced: 28 Jun 2025
https://github.com/priyabug/design-and-implementation-of-a-secure-company-network-system
Last synced: 28 Jun 2025
https://github.com/priyabug/race-condition-detection-and-mitigation
It explores race condition vulnerabilities, detection techniques, and mitigation strategies, providing insights into how they are exploited and how to prevent them.
attack-program countermeasure detection improved-attack mitigation python race-conditions target-machine ubuntu
Last synced: 26 Jul 2025
https://github.com/priyabug/tcp-ip-protocol-analysis-implementation
Here we explore several security weaknesses in the TCP/IP stack, demonstrating how attackers exploit protocol flaws and how to implement countermeasures. This includes simulations, analysis of common attack techniques, and security best practices to mitigate threats.
cookiesession hijacking-methods syn tcp tcp-client tcp-server tcp-socket
Last synced: 01 Aug 2025
https://github.com/priyabug/efficient-data-transfer-with-rdma-memory-registration-and-request-handling
This project explores efficient data transfer mechanisms using RDMA, focusing on memory registration, request handling, and performance optimizations.Here we can see the demonstration of how RDMA improves network efficiency by bypassing the operating system kernel and offloading data movement to the network interface card.
flow-control generating-memory operating-system pinning-memory read-direct-memory-access synchronization work-queue zero-copy
Last synced: 08 Aug 2025
https://github.com/priyabug/implementation-of-remote-dns-cache-poisoning-
DNS Cache Poisoning, also known as DNS Spoofing, is a critical security vulnerability where an attacker injects false DNS records into a resolver’s cache, redirecting users to malicious sites. This attack exploits weaknesses in the DNS resolution process, allowing attackers to manipulate how domain names are resolved into IP addresses remotely.
dns-cache dns-over-tls dns-server-setup packet-spoofing spoofing-dns-responses
Last synced: 12 Aug 2025
https://github.com/priyabug/wireless-lan-controller-wlc-configuration-using-cisco-packet-tracer
Wireless LAN Controller Configuration
802-1x access-points dhcp-server laps monitoring verification wireless-communication wlan wlan-profiles wlc
Last synced: 19 Aug 2025