Pinned Repositories
ASLR_smack_and_laugh
Some exploits from the paper "ASLR Smack and Laugh Reference", Involving Buffer Overflows. Some Perl Scripts are also attached.
Basic-Penetration-Testing-THM
Write-up of Basic Pen Testing module on TryHackMe.
CVE-2021-4034
PWNKIT - Local Privilege Escalation Vulnerability on Linux (Polkit)
DES_Python
DES implementation in python
Exploit-Development-BOF-Scripts
Feistel-Network
2 round Feistel network Implementation
Final_Exploit
Exploited a vulnerable binary by doing buffer overflow and exploiting Format string vulnerabilities.
flAWS-writeup
Write up of all 6 levels on flaws.cloud domain. Improved my working knowledge of cloud security
Meet-in-the-Middle-2DES
Meet in the middle attacks on 2DES encryption
OSCP
OSCP Preperation and Scripts
HrishitJoshi's Repositories
HrishitJoshi/Exploit-Development-BOF-Scripts
HrishitJoshi/flAWS-writeup
Write up of all 6 levels on flaws.cloud domain. Improved my working knowledge of cloud security
HrishitJoshi/ASLR_smack_and_laugh
Some exploits from the paper "ASLR Smack and Laugh Reference", Involving Buffer Overflows. Some Perl Scripts are also attached.
HrishitJoshi/CVE-2021-4034
PWNKIT - Local Privilege Escalation Vulnerability on Linux (Polkit)
HrishitJoshi/OSCP
OSCP Preperation and Scripts
HrishitJoshi/Basic-Penetration-Testing-THM
Write-up of Basic Pen Testing module on TryHackMe.
HrishitJoshi/DES_Python
DES implementation in python
HrishitJoshi/Feistel-Network
2 round Feistel network Implementation
HrishitJoshi/Final_Exploit
Exploited a vulnerable binary by doing buffer overflow and exploiting Format string vulnerabilities.
HrishitJoshi/Meet-in-the-Middle-2DES
Meet in the middle attacks on 2DES encryption
HrishitJoshi/NOOOO
yes.
HrishitJoshi/phpmyadmin-authentication-bruteforce
phpMyAdmin Authentication Bruteforce Tool
HrishitJoshi/Row-transpose-cipher
HrishitJoshi/Secure-Password-Generator
Cryptographically Secure Password Generator with Python
HrishitJoshi/SecureDigitalVoting
Network Security w Trappe
HrishitJoshi/Shift-Vigenere-Cipher-Attacks
Coded Shift and Vigenère ciphers in python and performed a successful index of Coincidence (IC) attacks on both the ciphers
HrishitJoshi/Voting-Application