The AI Privacy Policy Analyzer is a Chrome extension designed to help users understand and critique the privacy policies of websites they visit with the help of LLM.
Language: Java Script
Target to be learned: LLM, Chrome extension development
This project analyzes social engineering cyber threats during COVID-19, focusing on attack vectors, impacted sectors, and socio-economic effects, offering actionable strategies to enhance cybersecurity resilience during global crises.
Target to be learned: Systemization of Knowledge
Designed and secured a smart home IoT system, identifying vulnerabilities like unencrypted MQTT communication. Implemented TLS encryption, enhancing data privacy and mitigating risks, while showcasing expertise in IoT security and vulnerability analysis.
Hardware: Raspberry Pi 4, ESP32 Module, Smart IP Camera, Mikrotik Router.
Software: Home Assistant, Mosquitto MQTT Broker, Wireshark.
Protocols: MQTT, TLS, HTTPS.
Target to be learned: Implementing a IoT Security solution
This project Analyzed and mitigated a stored XSS vulnerability in PrestaShop by exploiting SVG uploads, using security tools like OWASP ZAP and Nessus, and implementing effective defence strategies to enhance platform security.
Target to be learned: Penetration testing and mitigation
This project investigates container security by implementing attacks such as CVE-2024-21626, CVE-2022-0847, and volume mount attacks on Docker. It designs defense mechanisms, employs vulnerability scanning tools like Snyk, Trivy, and Grype, and explores mitigation strategies to enhance the resilience of containerized environments.
Target to be learned: Secure containers by exploiting vulnerabilities, implementing defenses, and evaluating scanning tools.
This project implements RSA encryption, decryption, and digital signatures without pre-built libraries. It involves key generation, secure message exchange, and signature verification between partners, emphasizing cryptographic concepts and practical implementation.
Target to be learned: Understand and implement RSA cryptography by generating keys, encrypting and decrypting messages, and verifying digital signatures.
This project explores the performance and implementation of cryptographic algorithms, including DES, RSA, and SHA-512. It involves encryption, decryption, and hashing of varying data sizes to analyze execution times and efficiency across methods, emphasizing secure communication and cryptographic evaluation.
Target to be learned: Analyze, implement, and evaluate cryptographic algorithms to understand their performance and practical applications in secure data handling.