Saransh's Projects
android methods are hard to remember so here is the cheat sheet to make development process faster.
Artificial neural network from scratch
This repository contains the code of backdoor which can be used to exploit victim's machine ,we can download /upload /execute commands on victims machine from our machine .
This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.
This is a repository contains all the basic implementation of C programs and also feel free to contribute as well , as i will be uploading dataStructure with seperately
This repository will contain the explanation and implementation of DSA algorithms along with some applications in c and python
The repo contains a c program to perform dictionary attack with help of wordlist which contains the words and a hash which needs to be cracked.
This page will contain all the links to the script and exploits built from scratch in python as well as c code.
This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting , network sniffing ,network cracking ,brute forcing and MITM attacks docs for http connection only .
webscraper which scraps the links using Jsoup in java
This repository is all about implementation of basic concepts of linux system programming ,which willl help programmer to refresh their concepts or will help noobs to see how theoretical concepts works when written.
Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then again logIn.
This repository will be containing all the info related to building own Peer to Peer network
This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipboard and appends them in the keylogs file
This repo explains the process of sandboxing with python as It is a computer security term reffering to when a program in set aside from other progams in a seprate environment so that if errors or security issues occur ,those issues will not spread to other areas on the computer .
This repository contains the python script which will help to steal the wifi password stored only in windows machine .
This repository contains the python script which will scrap the google to download images .
This script will take screenshot and save it to the specified location . you can either use it in building trojans or you can use some other ways please.
Repository contains the Script to sign the message as well as verify the message using openssl with python
script to sniff packets in python using scape
Tcp proxy we can forward the traffic from host to host as well as useful when assessing network based software.
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
Config files for my GitHub profile.