Build Your Own NTP Client

An NTP client helps keep your local machine / server’s time in sync with other machines and perhaps authoratitive clocks. ...

Build Your Own Password Cracker

This challenge is to build your own version of John the Ripper or CrackStation. These are password cracking tools that can be used to recover passwords, by penetration testers and of course bad guys. ...

Build Your Own Password Manager

A password manager is a tool to help users securely store, manage, and generate passwords. It simplifies the process of maintaining strong, unique passwords for multiple accounts by securely storing them in an encrypted database. Users only need to remember a single master password to access the password manager. Common Features Can Include: Password Storage: Safely stores login credentials for websites, apps, and devices. Password Generation: Creates strong, random passwords to enhance security. Autofill: Automatically fills in login forms to save time and prevent keylogging attacks. Synchronization: Syncs data across devices, ensuring access to passwords anywhere. Secure Sharing: Allows users to share credentials securely with others when needed. Why Use One? Password managers reduce the risk of using weak or reused passwords, which are common vulnerabilities in online security. They also protect against phishing attacks by ensuring passwords are only used on legitimate websites. ...

Build Your Own Pastebin

Pastebin is an online service that allows users to share plain text, code snippets, or other textual content quickly and easily. It is commonly used by programmers, hackers, or anyone needing to share blocks of text publicly or privately. ...

Build Your Own Pong Game

Pong is a table tennis-themed game that Atari originally released in 1972. It was apparently the first commercially successful computer game and a key part of establishing the computer gaming industry. ...

Build Your Own Port Scanner

A port scanner is an program that probes a host to identify open network ports. Malicious actors use port scanners to find network services running on a host in order to find and exploit vulnerabilities. Security analysts and network administrators use port scanners to confirm network security policies are being complied with. ...

Build Your Own QR Code Generator

Build a QR Code Generator. ...

Build Your Own Rate Limiter

Build your own API Rate Limiter, ready to sit in front of your API. ...

Build Your Own Real-Time Chat Server And Client.

Build your own real-time chat server and client. ...

Build Your Own Redis Command Line Tool

Build a command line too to communicate with a Redis server. This is a great project to build alongside a Redis server. ...