Cybersecurity & Ethical Hacking

B.Tech completed / B.Tech 3rd or 4th year

Trainers

MB

Mr. Himaneesh Mishra, B.Tech

Security Analyst - CIEL HR

SM

Sri. Sadashivan S, B.Tech & MBA

Manager-TATA Teleservices

MJ

Mr. Derick Mathew Johnson

"President at MRISA - Cyber security club", Manav Rachana Institute of Research & Studies.

MK

Mr. Jay Kotadia

Top 3% on TryHackMe || CTF Player || CyberSecurity Enthusiast & Cyber Security Inte

MP

Mr. Meghraj Patil

ISC2(cc) || SC-900 || AZ-900 || Tryhackme Top 1% CTF Player || Cybersecurity Analyst at Kirta

NA

Nishchay Gaba, Bachelor's in Computer Application

Cybersecurity Researcher at Hacking Articles

Github Projects

c

AI-Powered-IDS-for-CAN-networks

chinmayee-04

This project develops an AI-based Intrusion Detection System (IDS) for vehicle CAN networks by analyzing CAN bus data and using machine learning and deep learning models to detect and classify cyberattacks such as flooding, fuzzy, replay, and malfunction attacks.

Cybersecurity & Ethical Hacking

PythonPublic
V

Cryptify

VeerSingh0001

Quantum resistance AES-GCM(256bit) based File Encryption Tool.

Cybersecurity & Ethical Hacking

PythonPublic
d

Digital-Forensics-AI-Generated-Multimedia

diyathakur5

An AI-based digital forensics system that detects AI-generated vs human-generated text and images using explainable forensic analysis techniques.

Cybersecurity & Ethical Hacking

Public
m

Android-Application-Security-Assessment

manvendra104

This project is a comprehensive security assessment of the DIVA and Allsafe Android applications, conducted to identify and remediate critical vulnerabilities. Using a combination of Static Application Security Testing and Dynamic Application Security Testing, the audit uncovered severe flaws including SQL Injection, Hardcoded Credentials.

Cybersecurity & Ethical Hacking

Public
j

secure-encryption-tool

jakkalilokesh

Secure Encryption Tool is a web-based application that encrypts large files up to 10GB using streamed chunk-based processing. It supports AES-256-GCM, ChaCha20-Poly1305, AES-256-SIV, with browser-based key storage and key management using RSA-4096 and X25519 and with Image Steganography Features.

Cybersecurity & Ethical Hacking

JavaScriptPublic
p

Digital-Forensics-AI-Generated-Multimedia

prathyushakale-1310

Digital Forensics of AI-Generated Multimedia is an AI-based cybersecurity project that detects whether text and images are AI-generated or human-created using stylometric analysis, linguistic features, and digital image forensic techniques to support content authenticity and cyber investigations.

Cybersecurity & Ethical Hacking

HTMLPublic
E

AI-Powered-IDS-for-CAN-networks

ESWRACHARI

This project develops an AI-based Intrusion Detection System (IDS) for vehicle CAN networks by analyzing CAN bus data and using machine learning and deep learning models to detect and classify cyberattacks such as flooding, fuzzy, replay, and malfunction attacks.

Cybersecurity & Ethical Hacking

Public
N

Data-Encryption-Decryption-tool-with-added-functionality-

Nikhitharchana

The Data Encryption and Decryption Tool is a cybersecurity project that secures sensitive files using secret-key encryption. It supports encryption, decryption, data integrity checking, and secure file deletion, with both GUI and command-line interfaces for safe data handling.

Cybersecurity & Ethical Hacking

Public
A

Cryptify-lock-it-down

Akashdeep84

Cryptify is a post-quantum tool that secures files by combining ML-KEM (Kyber768) key exchange with AES-256 GCM encryption. It stream-compresses data via zstandard and uses Argon2id for password-based key derivation to protect against both classical and future quantum threats.

Cybersecurity & Ethical Hacking

PythonPublic
D

Secure-Network-Configuration-CPT-

Dik22sha

The Secure Network Configuration project was created using Cisco Packet Tracer to design a secure Campus Area Network. It included VLAN segmentation, routing, and access control for controlled communication. The project improved my understanding of secure network design and real-world security implementation.

Cybersecurity & Ethical Hacking

Public
N

AI-Powered-IDS-for-CAN-networks

Naveenreddy73

This project develops an AI-based Intrusion Detection System (IDS) for vehicle CAN networks by analyzing CAN bus data and using machine learning and deep learning models to detect and classify cyberattacks such as flooding, fuzzy, replay, and malfunction attacks.

Cybersecurity & Ethical Hacking

PythonPublic
0

Network-Pentesting

08deepak2702

Network Penetration Testing project demonstrating ethical hacking techniques to assess network security. Includes reconnaissance (Nmap), vulnerability scanning (Nessus, OpenVAS), exploitation (Metasploit), and post-exploitation. Tools: Kali Linux, Wireshark, Burp Suite. Focus on identifying and mitigating network vulnerabilities.

Cybersecurity & Ethical Hacking

Public
0

WebApp-Pentesting-Project

08deepak2702

A hands-on Web Application Penetration Testing project completed during my internship. It includes real-world testing techniques, vulnerability assessments, and reports on exploiting common web app flaws like SQLi, XSS, and CSRF. Tools used: Burp Suite, OWASP ZAP, and custom automation scripts.

Cybersecurity & Ethical Hacking

Public
t

VAPT-ON-WEB-APPLICATION

tejaswiniReddy01

Web application pentest on vulnweb, bWAPP and DVWA — uncovered SQLi, RFI, file-upload RCE, command injection and session flaws.

Cybersecurity & Ethical Hacking

Public
j

VAPT-ON-WEB-APPLICATION

jayavardhan150

Comprehensive Web Penetration Testing project focusing on OWASP Top 10 vulnerabilities. Targets: vulnweb, bWAPP, DVWA.

Cybersecurity & Ethical Hacking

Public
M

Vapt-On-Web-Application

MalaKalyanRam

This report summarizes a Vulnerability Assessment and Penetration Test (VAPT) performed against intentionally vulnerable environments: bWAPP (BeeBox), DVWA, and the “Artist” Vulnweb.

Cybersecurity & Ethical Hacking

Public
P

Web-VAPT-Project

PushkarPisolkar04

This project documents the discovery of common web application vulnerabilities through ethical penetration testing in a controlled environment. It aims to provide insights into web application security using intentionally insecure applications for educational purposes.

Cybersecurity & Ethical Hacking

Public
S

Web-Network-Pentesting-Project-Report

Saurabhsingh556

Web & Network Pentesting Project Report

Cybersecurity & Ethical Hacking

Public
M

Web-VAPT-Report_SureProEd

MeghashyamRavuru

A Web Application Penetration Testing (VAPT) report conducted as part of an internship project at SURE ProED. This report identifies vulnerabilities across three test web applications (DVWA, bWAPP, and Acunetix Test Site), classifies them by severity (Critical, High, Medium, Low), and provides remediation steps to strengthen application security.

Cybersecurity & Ethical Hacking

Public
P

WebPentesting-_Major_Project

Parth2907

This repository contains a web penetration testing report created during my six-month internship at Sure Trust/ProEd.

Cybersecurity & Ethical Hacking

Public
N

Web_Pentesting_Report_SureTrust

Naga-Mounika-Yarrabathula

This project focuses on web application penetration testing by identifying, analyzing, and documenting vulnerabilities in intentionally vulnerable platforms such as DVWA, bWAPP, and Vulhub. It demonstrates practical exploitation of OWASP Top 10 issues, along with security testing methods and suggested mitigations

Cybersecurity & Ethical Hacking

Public
A

Web_Pentesting_Project

Aura007

This project documents a comprehensive web penetration test conducted on bWAPP, DVWA, and Artist VulnHub. It covers reconnaissance, vulnerability assessment, exploitation, privilege escalation, and reporting, demonstrating real-world attack scenarios mapped to OWASP Top 10 with mitigations.

Cybersecurity & Ethical Hacking

Public
h

qwik-x

harshmangalam

Social media web app like Twitter build with Qwikcity

Cybersecurity & Ethical Hacking

TypeScriptPublic
D

DOLA-LAKSHMI-PRASANNA-g3-integrated-vlsi

DolaLakshmiPrasanna

Vending Machine Controller Project defines the specifications and based on the design and specs, we need to verify the design using UVM Verification.

Cybersecurity & Ethical Hacking

Public
n

SURE-Trust-Network-Penetration-Testing

npatell

Black-box network penetration testing project using tools like Nmap, Nessus, Metasploit & Burp Suite. Includes CVSS-based risk assessment & remediation roadmap.

Cybersecurity & Ethical Hacking

Public
r

SURE-Trust-Network-Penetration-Testing

ritik2898

Black-box network penetration testing project using tools like Nmap, Nessus, Metasploit & Burp Suite. Includes CVSS-based risk assessment & remediation roadmap.

Cybersecurity & Ethical Hacking

Public
S

SURE-Trust-Network-Penetration-Testing

SamD-X

Black-box network penetration testing project using tools like Nmap, Nessus, Metasploit & Burp Suite. Includes CVSS-based risk assessment & remediation roadmap.

Cybersecurity & Ethical Hacking

Public
M

SURE-Trust-Network-Penetration-Testing

MARNISAISATVIKA

Black-box network penetration testing project using tools like Nmap, Nessus, Metasploit & Burp Suite. Includes CVSS-based risk assessment & remediation roadmap.

Cybersecurity & Ethical Hacking

Public
G

SURE_Trust_Internship_VAPT_Infrastructural_on_Public_IPs

Gopalvamsikrishna

Vulnerability Assessment and Penetration Testing (VAPT) Internship Project conducted under Sure Trust, focusing on identifying security risks in public IP infrastructure using industry-standard tools and methodologies.

Cybersecurity & Ethical Hacking

Public
S

Cybersecurity

SRUJAN-BANDARU

This is a project on Network Penetration Testing

Cybersecurity & Ethical Hacking

Public
j

vulnerability-assessment-and-pentesting-on-IP-Address

jayaprakashreddy561

This project focuses on identifying security weaknesses in a network by performing vulnerability assessment and penetration testing on a specific IP address. Tools like Nmap, Nessus, Metasploit, and Wireshark were used for scanning, analysis, and exploitation. The goal was to simulate real-world attacks in a safe environment

Cybersecurity & Ethical Hacking

Public
d

Sure-Internship-report

darshanmoradiya

Includes final capstone project and internship report, highlighting key learnings, skills gained, and hands-on project experience during the Sure Trust internship.

Cybersecurity & Ethical Hacking

Public