Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for far more likely
GitHub Repo https://github.com/datadesk/ripa-analysis

datadesk/ripa-analysis

A Los Angeles Times analysis found that LAPD officers search blacks and Latinos far more often than whites during traffic stops even though whites are more likely to be found with illegal items.
GitHub Repo https://github.com/emaloy56/Ultrasonic-Robot-Plan

emaloy56/Ultrasonic-Robot-Plan

The ultrasonic robot is my first full on Project so far. I most likely me to keep track of my documentation of the project as well as time management spent on different parts. I will add more documentation as the project goes on.
GitHub Repo https://github.com/priyankgada/The-Complete-Practical-Certified-Ethical-Hacking-Course-in-English

priyankgada/The-Complete-Practical-Certified-Ethical-Hacking-Course-in-English

Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts! This course is highly practical but it won't neglect the theory, so we'll start with ethical hacking basics and the different fields in penetration testing, installing the needed software (works on Windows, Linux and Mac OS X) and then we'll dive and start hacking systems straight away. From here onwards you'll learn everything by example, by analysing and exploiting computer systems such as networks, servers, clients, websites .....etc, so we'll never have any boring dry theoretical lectures. The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses and hack into it, not only that but you'll also learn how to secure this system from the discussed attacks. This course will take you from a beginner to a more advanced level by the time you finish, you will have knowledge about most penetration testing fields. The course is divided into four main sections: 1. Network Hacking - This section will teach you how to test the security of networks, both wired and wireless. First, you will learn some basic network terminology, how networks work, and how devices communicate with each other. Then it will branch into three sub sections: Pre-connection attacks: in this subsection you'll learn what can you do before even connecting to a network, and even before having internet access; you'll start by learning how to gather information about the networks around you, discover the devices connected to them, and how to control connections around you (ie: deny/allow devices from connecting to networks) even without knowing the password of the target network. Gaining Access: Now that you gathered information about the networks around you, in this subsection you will learn how to crack the key and get the password to your target network weather it uses WEP, WPA or even WPA2. Post Connection attacks: Now that you have the key, you can connect to the target network, in this subsection you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and much more! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients. 2. Gaining Access - In this section you will learn two main approaches to gain full control or hack computer systems: Server Side Attacks: In this subsection you will learn how to gain full access to computer systems without the need for user interaction. You will learn how to gather useful information about a target computer system such as its operating system, open ports, installed services, then you'll learn how to use this information to discover weaknesses and vulnerabilitiesand exploit them to gain full control over the target. Finally you will learn how to generate different types of reports for your discoveries. Client Side Attacks - If the target system does not contain any weaknesses then the only way to gain access to it is by interacting with the users, in this subsection you'll learn how to get the target user to install a backdoor on their system without even realising, this is done by hijacking updatesor backdoornig downloadeds on the fly. Not only that but you'll also learn how to create trojans by backdooring normal files (such as an image or a pdf) and use social engineering to deliver this trojan to the target, to do this you'll learn how to spoof emails so they appear as if they're sent from the target's friend, boss or any email account they're likely to interact with. 3. Post Exploitation - In this section you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target and even use the target computer as a pivot to hack other computer systems. 4. Website / Web Application Hacking - In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the following dangerous vulnerabilities to hack into websites:
GitHub Repo https://github.com/PATIL1695/FarmBay

PATIL1695/FarmBay

Members: Vishwanath Patil Roopam Rajvanshi Manisha Shivshette Thien Nguyen FarmBay Our aim is to make the lives of millions of farmers easier by helping them make criticial decisions about the type of crops best suited for their fields with respect to maximum monetary gains and at the same time giving them an online market place where they can easily sell off their produce based on an auction framework. This will not only help farmers but also wholesale buyers of crops and give them access to more options thus creating a better interconected network for business. To acieve the first objective, we implement Machine Learning and Predictive Data Modeling on the dataset collected for the previous years for all the crops from the National Agricultural Statistics Service (NASS) arm of United States Department of Agriculture (USDA). Data is refined as per requirement so that it gives a list of best suited crops in descending order for the farmer based on key input parameters namely Zip Code, State, Farming Area, Time Duration, Amount Invested and Expected Returns. Using the suggestion from the Machine Learning algorithm, the farmer can make a well informed decision about the crop he's most likely to receive maximum profits from. The second objective involves giving the farmer the ability to list his crop on an online market place and place a minimum value of his produce as per his calculations. That is the minimum bid at which the farmer can make the sale. Once the crop is placed on the market place, a buyer anywhere in the nation will be able to see the listed crop and place a bid accordingly. Firebase Database instance is used to store the crop data for all farmers and the consequent bidding process. Blockchain is implemented to approve the transactions in real time and make the entire process as seamless as possible. The inspiration behind this project is to create something to serve the farmers who even after putting in so much effort into their fields end up losing huge sums of money becasue of insufficient information. We believe in serving and creating a better community and improving the lives of people by doing our part in the bigger scheme of things.
GitHub Repo https://github.com/vmware-archive/app-control-event-kernel-module

vmware-archive/app-control-event-kernel-module

dynsec stands for Dynamic Security.The project is an external Linux kernel module is geared towards providing more granular access controls to file operations to userspace that doesn't exist for the versions of Linux kernels the AppControl CarbonBlack product currently supports. This is meant to replace the existing CarbonBlack AppControl kernel module.This kernel module was created in a much more generic manner to fulfill AppControl's file protection/access control oriented features that is critical to their exception list handling approach to access controls.However the kernel module could be used for different access control techniques, it's really up to the userspace implementation.The kernel module may be useful for other products that might have a strong business want, and would likely utilize a subset of the features to provide access controls. Example subset usage may be geared towards protecting specific files and processes that is owned by the product using this (anti-tampering) or protecting other some subset of files and processes not owned by the product.The main business reason for AppControl to using this kernel module is to logically separate business logic away from the kernel landscape while protecting proprietary work. Additionally this kernel module provides more accurate data, performance optimizations and more options to improve the overall security efficacy of the AppControl product.The longer term goal which is not in this project, is to eventually utilize BPF (extended Berkley Packet Filter) to provide access controls when they become more widely available for targeted distros. This kernel module is to help bridge the gap as far security features in the meantime, while fulfilling CarbonBlack AppControl's current needs.
GitHub Repo https://github.com/Faria-Sidd/faria-sidd.github.io

Faria-Sidd/faria-sidd.github.io

Education is a lifelong process. It never ends, and the more one studies, the more likely is for him to grow intellectually and at the same time, professionally.
GitHub Repo https://github.com/cmhhelgeson/Console-Fire-Emblem-Test

cmhhelgeson/Console-Fire-Emblem-Test

What it says on the tin. Probably a more complicated project given the number of states likely involved, however so far it's been neat just coding the ability to pick multiple objects up with a cursor and move them around.
GitHub Repo https://github.com/fareastreviews/Far-East-XL

fareastreviews/Far-East-XL

You can guarantee the most reduced Rhino Spark Cost by clicking any picture or catch on this page to perceive what select male improvement recipe bargains are occurring! In the event that you click on schedule, you can even guarantee a FREE TRIAL OFFER of the top selling execution mix! With this mind boggling offer, you can be sure that you are getting the least Far East XL Price by just paying for postage. That way, you can evaluate the top selling execution pills for as long as about fourteen days to perceive your opinion prior to submitting completely. Yet, the more you stand by, the more probable that this inconceivable offer could lapse, or supplies could sell out before you attempt it. Thus, in the event that you are prepared to guarantee the most reduced Rhino Spark Cost, click any picture or catch on this page to get horny and enthusiastic in the room again while supplies last After seeing the monster that you can become in the room with these incredible pills, you are likely pondering where to purchase Far East XL Formula. You have two alternatives for getting your hand on this incredible item. You can either track down the authority item site all alone or snap any picture or catch on this page to perceive what elite offers are accessible for the top selling equation. On the off chance that you hustle, you can even guarantee a FREE TRIAL OFFER of the top selling recipe! With this unbelievable arrangement, you can get the rhino horn down beneath to improve your exhibitions for the last time. In any case, the more you stand by, the almost certain that this unbelievable offer could lapse, or supplies could sell out. Along these lines, click any picture or catch on this page to guarantee a FREE TRIAL OFFER of the #1 pills before it's past the point of no return! Click here https://www.seekerstime.com/far-east-xl-reviews-real-male-enhancement-pills-price-for-sale-2021/
GitHub Repo https://github.com/MUDAYSHANKAR/Customer-Churn-Prediction-project

MUDAYSHANKAR/Customer-Churn-Prediction-project

In industries like telecom, banking, and SaaS, retaining customers is far more cost-effective than acquiring new ones. I built an ML model that predicts if a customer is likely to leave (churn) based on usage patterns, subscription details, and support interactions.
GitHub Repo https://github.com/nnation/pt_disciplined_trading

nnation/pt_disciplined_trading

Settings for Profit Trailer 1.2.6.25 and PTMagic 1.4.0+. This group of settings is geared towards more disciplined buys and sales. Pairs are held for hours or days, but result in 5-10% gains. DCAs are far less likely, resulting in less use of capital when the bot buys on a false indicator.