Welcome to ProdigyInfoTech's Cybersecurity Projects Repository!
Here you'll find a selection of unique initiatives I created during my internship, all aimed at addressing the ever-increasing difficulties of cybersecurity.
-
Implement caesar cipher
-
Pixel Mainpulation for image Encryption
-
Password Complexity Checker
-
Simple Keylogger
-
Network Packet Analyzer
Pixel Mainpulation for image Encryption
The Caesar cipher is a simple encryption technique. It operates by moving the letters in the plaintext message by a predetermined number of positions, called as the "shift" or "key".
Here is an example of how to use the Caesar cipher to encrypt the message “HELLO” with a shift of 3: Write down the plaintext message: HELLO Choose a shift value. In this case, we will use a shift of 3. Replace each letter in the plaintext message with the letter that is three positions to the right in the alphabet.
H becomes K (shift 3 from H)
E becomes H (shift 3 from E)
L becomes O (shift 3 from L)
L becomes O (shift 3 from L)
-
Mainpulation for image Encryption Pixel manipulation is an innovative technique to image encryption that employs cryptographic algorithms and libraries such as NumPy and Pillow to substitute, permute, and disperse individual pixel values. This technology improves image security and is critical for securing digital information.
-
Password Complexity Checker The Cyber Security Agency of Singapore has created a checker that estimates the time it would take for cybercriminals to figure out a password. Passwords are not saved or stored; it is solely intended for instructional reasons.
-
Simple Keylogger A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific device, such as a computer or smartphone
- Network Packet Analyzer A packet sniffer (also known as a packet analyzer, protocol analyzer, or network analyzer) is a piece of hardware or software that monitors network traffic. Sniffers examine streams of data packets that move between networked computers and the greater Internet.
Let's talk! I'd love to hear from you!, email contact@prodigyinfotech.dev