I will use this repository to store projects related to the field of cybersecurity i.e, for protecting or penetrating systems and services.
Keylogger - A keylogger program that emails system information, logged keystrokes, mouse activity, screenshots and microphone data.
Secret Image Sharing - Implemented Thien and Lin's method for secret image sharing.
Rule Enforcement Verification (REV) - Suggested by Zhang et al., this can be used to enforce rule verification in a network.