An open API service indexing awesome lists of open source software.

Projects in Awesome Lists by Priyabug

A curated list of projects in awesome lists by Priyabug .

https://github.com/priyabug/deployment-and-prevention-of-threats-with-google-cloud-ngfw-enterprise

Explored the deployment and usage of Google Cloud Firewall Plus, a native Google Cloud service integrated with Palo Alto Networks' Threat Prevention technologies.

configuration-management firewall-management firewall-template google-cloud-platform iam load-balancer ngfw-configuration security security-tools terraform virtual-machine

Last synced: 15 Mar 2025

https://github.com/priyabug/priyabug

Config files for my GitHub profile.

config github-config

Last synced: 15 Mar 2025

https://github.com/priyabug/vulnerabilities-in-the-tcp-ip-protocol

Here we explore several security weaknesses in the TCP/IP stack, demonstrating how attackers exploit protocol flaws and how to implement countermeasures. This includes simulations, analysis of common attack techniques, and security best practices to mitigate threats.

cookiesession hijacking-methods syn tcp tcp-client tcp-server tcp-socket

Last synced: 15 Mar 2025

https://github.com/priyabug/virtual-private-network---ip-tunneling-and-routing

Virtual Private Network (VPN) enables secure communication over public or untrusted networks by encrypting traffic and routing it through a secure tunnel exploring VPN implementations, IP tunneling techniques, and routing mechanisms, demonstrating how VPNs establish secure connections and how traffic is managed across different network environments

router routing tunneling vpn vpn-client vpn-server

Last synced: 15 Mar 2025

https://github.com/priyabug/cisco-asa-high-availability-ha-failover-configuration

This project contains configurations and guides for setting up Cisco ASA firewalls in various network environments. It includes detailed steps for implementing High Availability (HA) failover, stateless and stateful failover, access control lists (ACLs), ICMP inspection, routing, and interface settings.It includes troubleshooting and verification

active-standby administrator-privileges cisco-asa cisco-ios esxi-vmware eve-ng firewall-rules gns3 high-availability high-availability-address network-address-translation virtual-private-network vmware-workstation

Last synced: 31 Jul 2025

https://github.com/priyabug/launching-bgp-network-on-one-of-the-autonomous-system

BGP exploration and the process of setting up a BGP network within an Autonomous System (AS), including BGP configuration, route advertisement, and path selection mechanisms. It covers real-world BGP implementations, security best practices, and network optimizations to enhance routing efficiency and prevent common vulnerabilities.

as-180 bgp bgp-configuration bgp-daemon bgp-router ebgp ibgp pathselection update

Last synced: 15 Mar 2025

https://github.com/priyabug/local-attacks-on-dns-server

This project provides hands-on simulations of DNS security threats, demonstrating how attackers exploit weaknesses in DNS resolution and how to mitigate these risks. By analyzing real-world attack scenarios and defensive measures, this project helps in understanding the significance of secure DNS configurations and encryption (DNSSEC),

dns-over-https dns-record dns-server dnscrypt scapy spoofing

Last synced: 15 Mar 2025

https://github.com/priyabug/cross-site-scripting-simulation-elgg

To protect web applications from XSS attacks simulations, detection techniques, and prevention strategies helping developers and security professionals understand and defend against XSS vulnerabilities.

elgg-plugin linux ubuntu

Last synced: 15 Mar 2025

https://github.com/priyabug/priyabug1

Last synced: 15 Mar 2025

https://github.com/priyabug/implemented-arp-cache-manipulation-to-identify-and-analyze-network-vulnerabilities.

This analysis focuses on ARP cache manipulation techniques to assess network security risks and analyze vulnerabilities. By modifying ARP tables, we can simulate real-world attack scenarios, study their impact, and implement countermeasures.

arp mitm-attacks scapy sniffing-spoofing

Last synced: 15 Mar 2025

https://github.com/priyabug/web-application-sql-injection-lab

This repository contains a hands-on lab for understanding SQL Injection attacks and their mitigations. SQL Injection is a critical vulnerability that allows attackers to manipulate database queries and access sensitive data.

container database docker mysql php sql sqlinjectionattack vulnerability-detection web webapplicationcontainer

Last synced: 27 Mar 2025

https://github.com/priyabug/building-ai-powered-applications-with-the-podman-ai-lab

Podman AI Lab is an open-source extension for Podman Desktop that allows you to work with LLMs ( Large Language Models ) in a local environment. From getting started with AI and experimenting with models and prompts to model serving and playgrounds for common generative AI use cases, Podman AI Lab enables you integration AI into your application

ai-environments ai-lab-container ai-lab-extension cloud containerized-applications deep-learning jupyter-notebook lightweight machine-learning native-cloud-technologies podman-desktop python3 tensor-flow testing

Last synced: 03 Mar 2025

https://github.com/priyabug/return-to-libc-attack-lab

The goal of this lab is to provide hands-on experience with a unique variant of the **buffer-overflow attack** that can bypass existing protection mechanisms in major Linux operating systems.

buffer-overflow compiler critical-vulnerabilities debugger gdb linux linux-kernel malicious-code malicious-shellcode ubuntu2004

Last synced: 10 Apr 2025

https://github.com/priyabug/icmp-redirect-attack-lab

Demonstrates the execution and impact of an ICMP Redirect Attack, focusing on how attackers can manipulate routing to hijack network traffic.

icmp icmp-redirect ip-protocol mitm-attacks python3 redirection routing show-ip-route ubuntu windows11

Last synced: 22 Feb 2025

https://github.com/priyabug/network-traffic-analysis-and-manipulation

Network Traffic analysis is a crucial aspect of network security and network management, enabling the monitoring, inspection, and interpretation of data packets flowing across a network.

capture-icmp capture-icmp-packet raw-sockets scapy sniffing spoofing spoofing-attack traceroute

Last synced: 19 Jul 2025

https://github.com/priyabug/design-and-implementation-of-a-simple-network

Design a network in Cisco Packet Tracer to connect the ACCOUNTS and DELIVERY departments, implementing best practices in cabling, IP addressing, and testing.

connectivity connectivity-testing crossover-cable ip-address-planning ip-addressing ip-configuration ping router-interface-configuration straight-through-cable subnetting traceroute troubleshooting

Last synced: 28 Jun 2025

https://github.com/priyabug/race-condition-detection-and-mitigation

It explores race condition vulnerabilities, detection techniques, and mitigation strategies, providing insights into how they are exploited and how to prevent them.

attack-program countermeasure detection improved-attack mitigation python race-conditions target-machine ubuntu

Last synced: 26 Jul 2025

https://github.com/priyabug/tcp-ip-protocol-analysis-implementation

Here we explore several security weaknesses in the TCP/IP stack, demonstrating how attackers exploit protocol flaws and how to implement countermeasures. This includes simulations, analysis of common attack techniques, and security best practices to mitigate threats.

cookiesession hijacking-methods syn tcp tcp-client tcp-server tcp-socket

Last synced: 01 Aug 2025

https://github.com/priyabug/efficient-data-transfer-with-rdma-memory-registration-and-request-handling

This project explores efficient data transfer mechanisms using RDMA, focusing on memory registration, request handling, and performance optimizations.Here we can see the demonstration of how RDMA improves network efficiency by bypassing the operating system kernel and offloading data movement to the network interface card.

flow-control generating-memory operating-system pinning-memory read-direct-memory-access synchronization work-queue zero-copy

Last synced: 08 Aug 2025

https://github.com/priyabug/implementation-of-remote-dns-cache-poisoning-

DNS Cache Poisoning, also known as DNS Spoofing, is a critical security vulnerability where an attacker injects false DNS records into a resolver’s cache, redirecting users to malicious sites. This attack exploits weaknesses in the DNS resolution process, allowing attackers to manipulate how domain names are resolved into IP addresses remotely.

dns-cache dns-over-tls dns-server-setup packet-spoofing spoofing-dns-responses

Last synced: 12 Aug 2025