Pinned Repositories
CTF-Writeups
Things we learned from Capture The Flag hacking competitions we participated in.
github-readme-stats
:zap: Dynamically generated stats for your github readmes
instagramPosts
mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
particles.js
A lightweight JavaScript library for creating particles
poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
PrivacyMeter
PrivacyMeter: Real-time Privacy Quantification for the Web
research-notes
SmartThingsAnalysisTools
SmartThings Analysis Tools
TheOgreProtocol
Implementation of onion routing in Python
aryanchandrakar's Repositories
aryanchandrakar/Trunk-Routing-Protocol
Enhanced Onion Routing Protocol, Trunk protocol to hide the identity and enhance privacy
aryanchandrakar/System-Accessor
determine whether the system has been compromised
aryanchandrakar/American_Sign_Language_Recognition
aryanchandrakar/aryanchandrakar
aryanchandrakar/Basic-Nmap-commands
aryanchandrakar/CryWolf
Improve the usability ratio of the browser's warnings and improve the vulnerability detection
aryanchandrakar/CTF-Writeups
Things we learned from Capture The Flag hacking competitions we participated in.
aryanchandrakar/github-readme-stats
:zap: Dynamically generated stats for your github readmes
aryanchandrakar/HTTPS-I
Image Protected Hypertext Transfer Protocol Secure
aryanchandrakar/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
aryanchandrakar/particles.js
A lightweight JavaScript library for creating particles
aryanchandrakar/Blockchain_Chat
aryanchandrakar/C-Codes
aryanchandrakar/C-programming
aryanchandrakar/Code-Injector
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce code into a vulnerable computer program and change the course of execution. Here done using python programming
aryanchandrakar/Cryptography
all encryptions in C & Python with & without use of libraries
aryanchandrakar/DNS-spoofer
DNS-domain name server spoofing, changing the requested domain by the victim to as adversary needs
aryanchandrakar/Java
javajavajavajavajavajava
aryanchandrakar/OS-DSA-C
OS & DSA famous problems imlpementation in C
aryanchandrakar/packet-sniffer
A packet analyzer or packet sniffer is a computer program or computer hardware such as a packet capture appliance, that can intercept and log traffic that passes over a computer network or part of a network., see what are the sites being visited image being double tapped on and even the passwords of some
aryanchandrakar/Parallel_Distributed_Computing
aryanchandrakar/Python-Basics
all the python basics, with proper comment and explanation, side by side to the code
aryanchandrakar/Reverse-Backdoor
form a reverse backdoor at victim's system and a listener at the adversary, listen to all the request repose and work done by victim
aryanchandrakar/SNORT-SocialEnng
aryanchandrakar/SQL
aryanchandrakar/SQL-in-C
implementation of SQL clauses in C
aryanchandrakar/SQL-injection
aryanchandrakar/SQL-MAP
aryanchandrakar/Step-ca
aryanchandrakar/Vulnerability_Scanner