I am a cybersecurity student and researcher. I am currently in my 3rd year of engineering.
i love to solve problems with technology.
I am always curious and eager to learn, my security reports have helped organizations like US DoE (United States Department of Energy), Indian Army, Indian Airforce, VIT Bhopal.
I enjoy red teaming a lot and currently developing skills for the post exploitation using C2 infrastructre.
A little Fun Fact: Most servers are prone to get attacked due to misconfiguration rather than improper authentication or authorization.
Popular repositories Loading
-
blacktiger
blacktiger PublicBlack Tiger is an easy recon tool that comprises tasks of many useful tools.
Shell 4
-
Intruder-Alert-System
Intruder-Alert-System Public: This system works with the existing security protocols and instantly alerts the administrator of any perceived threat or any suspicious attempts by using email with complete details like Ip addreโฆ
Python 1
-
Cyber-Action-Illegal-Traffic
Cyber-Action-Illegal-Traffic Public: This project works in coherence with existing access controls and instantly blocks the suspicious Ip address for a particular time and reports it as cyber incident in logs.
Python 1
-
-
Delta-Sync
Delta-Sync PublicA Control and Command based infrastructure serving as the command center for the inbound bot commands
C#
-
Ransomware-Defender
Ransomware-Defender PublicRansomware Defender is a cutting-edge program designed to protect your data from ransomware attacks by encrypting it beforehand according to the administrator's preferences.
Python
If the problem persists, check the GitHub status page or contact support.