Files for the cybersecurity workshop demonstrations.
Workshop stream recording: YouTube.
| Attack | Status | |
| Type | Subtype | |
| Validation | SQL Injection | ✔ |
| Cross-Site Scripting (XSS) | ✔ | |
| Shell Injection | ✔ | |
| Service Isolation | ✔ | |
| Deception | Phishing | ✔ |
| Spoofing | ✔ | |
| Cryptography | Caesar Cipher | ✔ |
| Base64 | ✔ | |
| Hash Cracking | ✔ | |
| Steganography | Mysterious Files | ✔ |
| Textual Cover-Up | ✔ | |
| Reverse Engineering | Finding Strings | ✔ |
| Code Inspection | ✔ | |
| Penetration | Denial of Service (DoS) | ✔ |
| Code Execution | ✔ | |