Nischay Hegde
hegdenischay
Malware Research @Sentinel-One, Formerly at @Uptycs. Alumnus of Amrita School of Engineering. Interests include C, C++, Java, Go, Python and Rust.
Languages
Repos
41
Stars
10
Forks
2
Top Language
Python
Loading contributions...
Top Repositories
Welcome bot for the newbies group. Not buggy as hell anymore!
A neural net made with NEURON, WIP
redirect all TCP/UDP traffic of any program to SOCKS5 proxy
List of awesome reverse engineering resources
Repo related to any talks I give in public
Fork of CAPEv2, WIP
Repositories
41Repo related to any talks I give in public
Welcome bot for the newbies group. Not buggy as hell anymore!
Fork of CAPEv2, WIP
No description provided.
redirect all TCP/UDP traffic of any program to SOCKS5 proxy
PennyWise automatically reads transaction SMS messages and transforms them into organized financial data with on-device AI assistance. No manual entry, no cloud processing, complete privacy.
Repo for the eBPF part of the CRACCON talk
No description provided.
A fast and simple Matrix sticker picker widget
No description provided.
No description provided.
List of awesome reverse engineering resources
No description provided.
Stickerpicker with gif search - demo ver
Wraps your program with WireGuard tunnel fully contained in Docker and serves SOCKS5 proxy to host machine.
🎥 Command line video player
A curated collection of useful Python snippets that you can understand in 30 seconds or less.
The Aya Book is an introductory book about using the Rust Programming Language and Aya library to build extended Berkley Packet Filter (eBPF) programs.
a Python 2/3 GUI for fast connect to KiwiSDR around the world (audio only)
Native Spotify client for the GNOME desktop
A Matrix-Signal puppeting bridge
No description provided.
PyQt5 GUI for ZCrypt of @malladisiddu
The Slackbot used in c0d3_h4cki05_' Slack team. WIP.
A neural net made with NEURON, WIP
Microsoft Teams puppeting bridge for Matrix
Docker compose environment for pwn (WIP)
No description provided.
The userscript that I made because I have some pet peeves with how Teams calls work
Basic decryption tool (going to do some temporary changes)