Skip to content
View kunmukh's full-sized avatar

Block or report kunmukh

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Published in ACNS 2025 - Reproducibility artifacts for the paper "ProvDP: Differential Privacy for System Provenance Datasets"

Python 4 2 Updated Jul 1, 2025
Jupyter Notebook 1 Updated Apr 18, 2025

Code and data for the paper _ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security__.

Python 4 2 Updated Mar 11, 2024

Evading Provenance-Based ML Detectors with Adversarial System Actions

Python 33 10 Updated Aug 18, 2024

Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)

Python 34 1 Updated Jan 27, 2025

Have fun with audit log analysis :)

152 35 Updated May 5, 2024

All Algorithms implemented in Python

Python 213,792 49,400 Updated Nov 22, 2025

This is the network diagrams, configuration guides, and hardware used for my home lab.

Shell 80 20 Updated Sep 11, 2018

Deploy your development pipeline today! Fully functioning jenkins, sonarqube, and reverse proxy with https certs.

Shell 30 13 Updated Sep 11, 2018

study material used for the 2018 CISSP exam

Batchfile 570 263 Updated Dec 21, 2020

This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.

Python 487 177 Updated Aug 25, 2021

Trusted side of the TEE

C 1,791 1,154 Updated Nov 26, 2025