Giter Club home page Giter Club logo

Hi there! 👋 I'm Saransh Arora

I'm a passionate Software Engineer. I love diving into challenging problems and crafting elegant solutions.

🌱 Currently, I'm exploring PeerToPeer Systems , Deeplearning and many more , and hoping to build something incredible one day.
💼 I'm open to collaborations and new opportunities.
📫 You can reach me at :
        LinkedIn : www.linkedin.com/in/imsaransh
        Blog : https://www.codexpace.in/2022/01/python-for-security-hacking.html
        Youtube Channel : https://youtube.com/playlist?list=PLO-kZAQx60GC6c2Rt9soW75TofTM4aE9U&si=hW_csJG_7iwkFFEi

Saransh's Projects

android-cheatsheet icon android-cheatsheet

android methods are hard to remember so here is the cheat sheet to make development process faster.

backdoor_in_python icon backdoor_in_python

This repository contains the code of backdoor which can be used to exploit victim's machine ,we can download /upload /execute commands on victims machine from our machine .

bluetooth-hacking- icon bluetooth-hacking-

This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.

c-programming- icon c-programming-

This is a repository contains all the basic implementation of C programs and also feel free to contribute as well , as i will be uploading dataStructure with seperately

data_structure_algorithms icon data_structure_algorithms

This repository will contain the explanation and implementation of DSA algorithms along with some applications in c and python

dictionary-attack icon dictionary-attack

The repo contains a c program to perform dictionary attack with help of wordlist which contains the words and a hash which needs to be cracked.

hacking-with-kali-cheatsheets icon hacking-with-kali-cheatsheets

This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting , network sniffing ,network cracking ,brute forcing and MITM attacks docs for http connection only .

linux-system-programming icon linux-system-programming

This repository is all about implementation of basic concepts of linux system programming ,which willl help programmer to refresh their concepts or will help noobs to see how theoretical concepts works when written.

man-in-the-browser-attack- icon man-in-the-browser-attack-

Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then again logIn.

peer-to-peer-systems icon peer-to-peer-systems

This repository will be containing all the info related to building own Peer to Peer network

python-keylogger icon python-keylogger

This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipboard and appends them in the keylogs file

sandboxdetection-with-python icon sandboxdetection-with-python

This repo explains the process of sandboxing with python as It is a computer security term reffering to when a program in set aside from other progams in a seprate environment so that if errors or security issues occur ,those issues will not spread to other areas on the computer .

saved_wifi_password_steal icon saved_wifi_password_steal

This repository contains the python script which will help to steal the wifi password stored only in windows machine .

screen-shot-in-python- icon screen-shot-in-python-

This script will take screenshot and save it to the specified location . you can either use it in building trojans or you can use some other ways please.

sign_verify_openssl icon sign_verify_openssl

Repository contains the Script to sign the message as well as verify the message using openssl with python

tcp_proxy icon tcp_proxy

Tcp proxy we can forward the traffic from host to host as well as useful when assessing network based software.

trojan-in-python icon trojan-in-python

This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.