CHANDRA KANT BAURI
Lynk4
Cyber Security Student.....
Languages
Top Repositories
A hands-on repository for beginners who want to explore and experiment with red teaming and offensive security methods.
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
247ctf writeups................
Malware Analysis and Reverse Engineering, Malware Analysis Reports..........
Making a bootable snake game in less than 512 bytes with a 16-bit real mode assembly, flat assembler, and Qemu
Write a bootloader from scratch..............
Repositories
45Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
Malware Analysis CTF
A hands-on repository for beginners who want to explore and experiment with red teaming and offensive security methods.
Malware Analysis and Reverse Engineering, Malware Analysis Reports..........
No description provided.
A simple reverse engineering challenges to improve your reverse engineering skills.
GHOST MAP is a Location-Oriented Sensing (LOS) tool designed for exhaustive image feature extraction and open-source geographic intelligence correlation. It leverages the Gemini API to analyze visual clues and infer high-precision geographic locations.
Live Vision is a demonstration of the next generation of human-computer interaction. Unlike traditional LLM wrappers that rely on text-based chat, this project uses a persistent WebSocket connection to stream raw sensory data (video frames and PCM audio) directly to Google's most advanced multimodal models.
Hey there! This repo is my personal playground where I tackle cloud security CTF challenges, mess around with exploits, and stash all my notes and scripts.
'pwnable.kr' is a non-commercial wargame site which provides various pwn challenges regarding system exploitation.
Making a bootable snake game in less than 512 bytes with a 16-bit real mode assembly, flat assembler, and Qemu
This repository houses Python notebooks and scripts that contain solutions to Kaggle competitions.
Malware Detection using machine learning
Socket Programming is a method to connect two nodes over a network to establish a means of communication between those two nodes. A node represents a computer or a physical device with an internet connection. A socket is the endpoint used for connecting to a node
Write a bootloader from scratch..............
Expose your local network to the World using Ngrok.
Return-oriented programming (ROP)
Create your first machine learning model in python...........
Artificial Intelligence (AI) and Machine Learning (ML) ....;)
low level Assembly Programming...................
Sentiment Analysis with HuggingFace transformers in Python.
Visualise 3d function in 2d using matplotlib and numpy in python
Try Hack Me Writeups...............
247ctf writeups................
How to Change Kali Linux Grub Background images
A report on Digital Forensics Investigation with SOP (Standard Operating Procedure)
It's Just a Demo portfolio. COPY PASTED .............
Solutions of codewars kata`s in Python3
Create your own crypto-collectables game to learn how to develop Solidity smart contracts with CryptoZombies, a free interactive code school.
🚀✨ Help beginners to contribute to open source projects