Programs:
- Encryption Decryption (Substitution and Transposition Cipher)
- Diffie Hellman Algorithm (Man-in-the-middle Attack)
- Packet Analyzer
- Hashing (Online Auction using SHA-512)
- IP Spoofing
- OTP (One Time Password) using Challenge-Response
- Buffer Overflow
- CAPTCHA