Continuation of CSE326 Project. But this time we were a team of 3 members. I worked on both frontend and backend. Also, I managed the whole devops part. I used docker to containerize the website. Then hosted the container on Render.com. I also used Github Actions for CI/CD. I used ReactJS for frontend and NodeJS for backend. Used Tailwind CSS for styling. I also used ExpressJS for the backend. PostgreSQL was used as the database. I used Sequelize as the ORM. Database was hosted on Supabase.
Supervisor: Hasibul Hasan
Docker
Github Actions
Tailwind CSS
Sequelize
PostgreSQL
Supabase
React JS
Node JS
Express JS
Render.com
Supervisor: Khaled Mahmud Shahriar
React JS
Node JS
Express JS
Oracle
PL/SQL
OpenGL
GLFW
GLEW
GLM
irrKlang
Soil2
FreeType
JavaFX
JFoenix
Socket Programming
Scene Builder
Android Studio
Java
XML
Godot 3.5.1
GDScript
GameJam
For client
OpenGL 4.5
Platformer Game
Flex
YACC
Bison
This was a part of CSE406 Project. A sample of Winnti malware was provided by my supervisor. A shared library object was provided. Using Radare2, I reverse engineered the malware and converted it to a C program. I also wrote a report on the malware. The report included the analysis of the malware, the reverse engineering process, and the conversion process.
Radare2
Ghidra
Winnti Malware
Reverse Engineering
LD Preload