Skip to content
Deuteri's Blog
Deuteri's Projects
Initializing search
hieuhdh/hieuhdh.github.io
Total visits:
updating
Your visits:
updating
Home
Blogs
Projects
Courses
Root me
Pygoat
EVABS
Categories
About me
Deuteri's Blog
hieuhdh/hieuhdh.github.io
Total visits:
updating
Your visits:
updating
Home
Blogs
Blogs
Abstract Mathematics
Abstract Mathematics
Abstract Algebra
Abstract Algebra
Modules
Boolean
CTF
CTF
Cryptography
Cryptography
Cryptography in picoCTF 2019
Cryptography in picoCTF 2021
Cryptography
Cryptography
Cryptographic Algorithms
Cryptographic Algorithms
Substitution Cipher
Substitution Cipher
Monoalphabetic Cipher
Monoalphabetic Cipher
ROT-X Cipher
Polyalphabetic Cipher
Polyalphabetic Cipher
Sysmetric Cryptosystems
Sysmetric Cryptosystems
None
Public-key Cryptosystems
Public-key Cryptosystems
Rivest-Shamir-Adleman (RSA) Algorithm
Elgamal Cipher
Digital Signature
Elliptic Curve Cryptosystem
Diffie-Hellman key exchange
Some problems
Some problems
Yao's millionaire problem
Computer Programming
Computer Programming
Object-oriented programming
Object-oriented programming
Encapsulation
Abstraction
Inheritance
Polymorphism
Malware
Malware
None
Vulnerability
Vulnerability
Buffer Overflow
Buffer Overflow
Arc injection
Practice Network security
Practice Network security
Bandit in website Overthewire
Bandit in website Overthewire
LEVEL 0 → LEVEL 10
LEVEL 11 → LEVEL 20
LEVEL 21 → LEVEL 30
Projects
Projects
2021
2021
Month 06
Month 06
Food inspection program
Robotic vacuum cleaner
Month 07
Month 07
Attendance management system
Month 08
Month 08
Brute force insider attack
Month 09
Month 09
Quadratic equations
Multi tasking program
Month 12
Month 12
Go chess
2022
2022
Month 06
Month 06
None
Courses
Courses
Information Security Course Structure
Information Security Course Structure
Semester 01
Semester 01
Introduction to programming
Introduction to programming
Theory part
Practice part
Books reference
Linear Algebra
Linear Algebra
Books reference
Calculus
Calculus
Books reference
Introduction to Information Security programs
Introduction to Information Security programs
Introduction to electrical engineering
Introduction to electrical engineering
Basic of Quantum Computer
Basic of Quantum Computer
Books reference
Semester 02
Semester 02
Object-oriented programming
Object-oriented programming
Theory part
Theory part
None
Project
None
Data structures and algorithms
Data structures and algorithms
Database
Database
Discrete structures
Discrete structures
Probability and statistics
Probability and statistics
Introduction to digital circuit
Introduction to digital circuit
Semester 03
Semester 03
Introduction to computer networks
Introduction to computer networks
Computer architecture
Computer architecture
Semester 04
Semester 04
Operating systems
Operating systems
Basic network programming
Basic network programming
Computer System programming
Computer System programming
Cryptography
Cryptography
Semester 05
Semester 05
Network security
Network security
Networks and Systems Administration
Networks and Systems Administration
Web-Based Application Development
Web-Based Application Development
Secure Programming and Exploiting Vulnerabilities
Secure Programming and Exploiting Vulnerabilities
Root me
Root me
Forensics
Forensics
Command and control
Command and control
None
Web Client
Web Client
XSS Attack
XSS Attack
None
XSS DOM Based - AngularJS
Web Server
Web Server
SQL injection
SQL injection
SQL injection - Authentication
SQL injection - Authentication GBK
SQL injection - String
SQL injection - Numeric
SQL Injection - Routed
SQL Truncation
SQL injection - Error
SQL injection - Insert
SQL injection - File reading
SQL injection - Time based
SQL injection - Blind
SQL injection - Filter bypass
PHP
PHP
Local File Inclusion
Local File Inclusion - Double encoding
Local File Inclusion - Wrappers
Remote File Inclusion
HTTP - Directory indexing
File upload - Double extensions
File upload - MIME type
Directory traversal
PHP - assert()
PHP - Filters
PHP - register globals
Pygoat
Pygoat
EVABS
EVABS
Categories
About me
DEUTERI'S PROJECTS
¶
Estimated time to read: 1 minute
Back to top