Skip to content
View redinfantry's full-sized avatar
๐Ÿ‡ฎ๐Ÿ‡ณ
Focusing
๐Ÿ‡ฎ๐Ÿ‡ณ
Focusing

Block or report redinfantry

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
redinfantry/README.md

๐Ÿ’ซ About Me:

I am a cybersecurity student and researcher. I am currently in my 3rd year of engineering.
i love to solve problems with technology.
I am always curious and eager to learn, my security reports have helped organizations like US DoE (United States Department of Energy), Indian Army, Indian Airforce, VIT Bhopal.
I enjoy red teaming a lot and currently developing skills for the post exploitation using C2 infrastructre.
A little Fun Fact: Most servers are prone to get attacked due to misconfiguration rather than improper authentication or authorization.

๐ŸŒ Socials:

LinkedIn

๐Ÿ’ป Tech Stack:

C++ CSS3 HTML5 C# Python Java Azure Bootstrap NodeJS jQuery Express.js Apache MongoDB MySQL

๐Ÿ“Š GitHub Stats:



โœ๏ธ Random Dev Quote

๐Ÿ” Top Contributed Repo

๐Ÿ˜‚ Random Dev Meme


Popular repositories Loading

  1. blacktiger blacktiger Public

    Black Tiger is an easy recon tool that comprises tasks of many useful tools.

    Shell 4

  2. Intruder-Alert-System Intruder-Alert-System Public

    : This system works with the existing security protocols and instantly alerts the administrator of any perceived threat or any suspicious attempts by using email with complete details like Ip addreโ€ฆ

    Python 1

  3. Cyber-Action-Illegal-Traffic Cyber-Action-Illegal-Traffic Public

    : This project works in coherence with existing access controls and instantly blocks the suspicious Ip address for a particular time and reports it as cyber incident in logs.

    Python 1

  4. Resume Resume Public

    Resume of Rupesh Kumar

  5. Delta-Sync Delta-Sync Public

    A Control and Command based infrastructure serving as the command center for the inbound bot commands

    C#

  6. Ransomware-Defender Ransomware-Defender Public

    Ransomware Defender is a cutting-edge program designed to protect your data from ransomware attacks by encrypting it beforehand according to the administrator's preferences.

    Python