Pinned Repositories
wi-jam
It is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.Fake access points are set up by configuring a wireless card to act as an access point.
assignments
Assignments I did for job interviews
mayank-khurana's Repositories
mayank-khurana/mayank-khurana.github.io
Build a Jekyll blog in minutes, without touching the command line.
mayank-khurana/assignments
Assignments I did for job interviews
mayank-khurana/MLOps
mayank-khurana/awesome-compose
Awesome Docker Compose samples
mayank-khurana/competitions
Colab Notebooks of the competitions where I achieve a good rank/score
mayank-khurana/Work_colabs
Some of the official work I did while in Organisations.
mayank-khurana/Employee-Access-Control-System
In the fields of physical security and information security, access control ( AC ) is the selective restriction of access to a place or other resources. It will scan the id card and decide what next to do.
mayank-khurana/wi-jam
It is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.Fake access points are set up by configuring a wireless card to act as an access point.