Skip to content
View pUrGe12's full-sized avatar
Block or Report

Block or report pUrGe12

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. G-code-visualisation-using-python G-code-visualisation-using-python Public

    A script that will sketch the shapes made by G-codes used in CNC machines using Python using python's turtle and regular expressions (re) library.

    Python

  2. tap-code-analyzer tap-code-analyzer Public

    Here, I have tried to develop a tool that can be used to listen to and analyze tap-codes. It will take in a .wav file and analyze it using python modules

    Python

  3. CTFs-writeup CTFs-writeup Public

    This repo consists of write-ups for different CTF challenges

    Python

  4. DLL-side-loading-poc DLL-side-loading-poc Public

    This repo contains a proof of concept for a technique called DLL side-loading, used to import malicious code into legitimate executables.

    C++

  5. BloodAlchemy-Prototype BloodAlchemy-Prototype Public

    This repo consists of a prototype of the malware called BloodAlchemy. The analysis was done by ElasticLabs and this repo consists of a small POC.

    C++

  6. Beep-AttackVector Beep-AttackVector Public

    This repo consists of a malware attack strategy, using encoding and encryption algorithms. Inspiration was taken from the BEEP malware, but implementation is varied.

    C++