priyankvadaliya
Infosec | Geek; Creativity is thinking up new things while innovation is transforming this Creativity to Reality.
india
Pinned Repositories
amazon-automation
amazon-automation
AwsomeOSINT
Awesome OSINT stuff
Business-model-of-cloud-computing
Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access procedures to prevent insiders to disclose the information without permission. In cloud computing, the data will be stored in storage provided by service providers. Service providers must have a viable way to protect their clients’ data, especially to prevent the data from disclosure by unauthorized insiders. Storing the data in encrypted form is a common method of information privacy protection. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a risk to information privacy. This study proposes a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext, and the party responsible for data encryption and encryption must delete all data upon the computation on encryption or decryption is complete. A CRM (Customer Relationship Management) service is described in this project as an example to illustrate the proposed business model.
Hack-Captive-Portal
This script helps to pass through the captive portals in public Wi-Fi networks. It hijacks IP and MAC from somebody who is already connected and authorized on captive portal.
hiring-assignments
rtCamp assignment and issue tracker
igbot
🐙 Free scripts, bots and Python API wrapper. Get free followers with our auto like, auto follow and other scripts!
mass-mailer
Python-based mass mailer script
Mysql-php-Crud-Operation
In this Mini Project, I will be presenting a complete CRUD system containing login and register feature. User should register himself first. And then he can add data after logging in.
Snipper-Scanner
Vulnerability scanner
Zip-Cracker-
Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline
priyankvadaliya's Repositories
priyankvadaliya/AwsomeOSINT
Awesome OSINT stuff
priyankvadaliya/Zip-Cracker-
Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline
priyankvadaliya/Hack-Captive-Portal
This script helps to pass through the captive portals in public Wi-Fi networks. It hijacks IP and MAC from somebody who is already connected and authorized on captive portal.
priyankvadaliya/Mysql-php-Crud-Operation
In this Mini Project, I will be presenting a complete CRUD system containing login and register feature. User should register himself first. And then he can add data after logging in.
priyankvadaliya/Snipper-Scanner
Vulnerability scanner
priyankvadaliya/igbot
🐙 Free scripts, bots and Python API wrapper. Get free followers with our auto like, auto follow and other scripts!
priyankvadaliya/mass-mailer
Python-based mass mailer script
priyankvadaliya/PassChaser
Passchaser is a simple tool for searching of default credentials for network devices, web applications and more
priyankvadaliya/QA-rtcamp
priyankvadaliya/Redirect-detective
python script which can show complete redirection list and target URL for a given URL.
priyankvadaliya/amazon-automation
amazon-automation
priyankvadaliya/Business-model-of-cloud-computing
Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access procedures to prevent insiders to disclose the information without permission. In cloud computing, the data will be stored in storage provided by service providers. Service providers must have a viable way to protect their clients’ data, especially to prevent the data from disclosure by unauthorized insiders. Storing the data in encrypted form is a common method of information privacy protection. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a risk to information privacy. This study proposes a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext, and the party responsible for data encryption and encryption must delete all data upon the computation on encryption or decryption is complete. A CRM (Customer Relationship Management) service is described in this project as an example to illustrate the proposed business model.
priyankvadaliya/hiring-assignments
rtCamp assignment and issue tracker
priyankvadaliya/leon
🧠 Leon is your open-source personal assistant.
priyankvadaliya/php-src
The PHP Interpreter
priyankvadaliya/priyankvadaliya
priyankvadaliya/Python
My Python Examples
priyankvadaliya/TakeHomeTask_Deel
priyankvadaliya/TorrentLeech-Gdrive
It is a fork of 'PublicLeech' with support of uploading files and foder to gdrive or any drive rclone.org support. Like onedrive, mega and so on. Now supports Unzip, unrar, untar too. Now you all can also mirror the telegram files to your respective cloud too.