Pinned Repositories
American_Sign_Language_Recognition
ARP-spoofer-detector
spoofing the arp tables to represent as usual gateway, changing IP MAC relations at victim's system, detecting the spoof attack
aryanchandrakar
aryanchandrakar.github.io
barcode_scanner-database_fetch-edit
scan barcode and retrieve information from database
CryWolf
Improve the usability ratio of the browser's warnings and improve the vulnerability detection
HTTPS-I
Image Protected Hypertext Transfer Protocol Secure
image-detection-identify-cat-non-cat
python numpy code to identify the % by which an uploaded pic is of cat or not
System-Accessor
determine whether the system has been compromised
Trunk-Routing-Protocol
Enhanced Onion Routing Protocol, Trunk protocol to hide the identity and enhance privacy
aryanchandrakar's Repositories
aryanchandrakar/Trunk-Routing-Protocol
Enhanced Onion Routing Protocol, Trunk protocol to hide the identity and enhance privacy
aryanchandrakar/System-Accessor
determine whether the system has been compromised
aryanchandrakar/American_Sign_Language_Recognition
aryanchandrakar/aryanchandrakar
aryanchandrakar/aryanchandrakar.github.io
aryanchandrakar/Basic-Nmap-commands
aryanchandrakar/CryWolf
Improve the usability ratio of the browser's warnings and improve the vulnerability detection
aryanchandrakar/HTTPS-I
Image Protected Hypertext Transfer Protocol Secure
aryanchandrakar/Blockchain_Chat
aryanchandrakar/C-Codes
aryanchandrakar/C-programming
aryanchandrakar/Code-Injector
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce code into a vulnerable computer program and change the course of execution. Here done using python programming
aryanchandrakar/Cryptography
all encryptions in C & Python with & without use of libraries
aryanchandrakar/CTF-Writeups
Things we learned from Capture The Flag hacking competitions we participated in.
aryanchandrakar/DNS-spoofer
DNS-domain name server spoofing, changing the requested domain by the victim to as adversary needs
aryanchandrakar/github-readme-stats
:zap: Dynamically generated stats for your github readmes
aryanchandrakar/Java
javajavajavajavajavajava
aryanchandrakar/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
aryanchandrakar/OS-DSA-C
OS & DSA famous problems imlpementation in C
aryanchandrakar/Parallel_Distributed_Computing
aryanchandrakar/particles.js
A lightweight JavaScript library for creating particles
aryanchandrakar/Python-Basics
all the python basics, with proper comment and explanation, side by side to the code
aryanchandrakar/Reverse-Backdoor
form a reverse backdoor at victim's system and a listener at the adversary, listen to all the request repose and work done by victim
aryanchandrakar/SNORT-SocialEnng
aryanchandrakar/SQL
aryanchandrakar/SQL-in-C
implementation of SQL clauses in C
aryanchandrakar/SQL-injection
aryanchandrakar/SQL-MAP
aryanchandrakar/Step-ca
aryanchandrakar/Vulnerability_Scanner