I'm a passionate Software Engineer. I love diving into challenging problems and crafting elegant solutions.
🌱 Currently, I'm exploring PeerToPeer Systems , Deeplearning and many more , and hoping to build something incredible one day.
💼 I'm open to collaborations and new opportunities.
📫 You can reach me at :
LinkedIn : www.linkedin.com/in/imsaransh
Blog : https://www.codexpace.in/2022/01/python-for-security-hacking.html
Youtube Channel : https://youtube.com/playlist?list=PLO-kZAQx60GC6c2Rt9soW75TofTM4aE9U&si=hW_csJG_7iwkFFEi
Pinned Loading
-
bluetooth-hacking-
bluetooth-hacking- PublicThis repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.
-
Python-Keylogger
Python-Keylogger PublicThis repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipboard and appends them in the keylogs file
-
Trojan-in-Python
Trojan-in-Python PublicThis repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which …
-
SandboxDetection-with-python
SandboxDetection-with-python PublicThis repo explains the process of sandboxing with python as It is a computer security term reffering to when a program in set aside from other progams in a seprate environment so that if errors or …
-
screen-shot-in-python-
screen-shot-in-python- PublicThis script will take screenshot and save it to the specified location . you can either use it in building trojans or you can use some other ways please.
-
hacking-and-security-with-python-and-c-code-
hacking-and-security-with-python-and-c-code- PublicThis page will contain all the links to the script and exploits built from scratch in python as well as c code.
If the problem persists, check the GitHub status page or contact support.