Inspiration
In buffer overflow attack, with randomized memory addresses, a shell script executing compiled code can get the root in 3 minutes. Does an alert reach an offline security guard, on time? how his defense will reach cloud entities?
What it does
Derive action and process them.
How I built it
Cross-platform app to run on ios, android and in a browser.
Challenges I ran into
Accomplishments that I'm proud of
What I learned
What's next for Unnamed app
Built With
- gloun
- graph-security-api
- java
Log in or sign up for Devpost to join the conversation.