Akash Thakur's Projects
Script for automating Linux memory capture and analysis
This shell script runs and checks if there is any load balancer working on the web server .
The Luhn algorithm or Luhn formula, also known as the "modulus 10" or "mod 10" algorithm, is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI numbers, National Provider Identifier numbers in the US, and Canadian Social Insurance Numbers.
Content for Udacity's Machine Learning curriculum
This repo consists of my machine learning projects practised during courses from multiple online sources.
Consists of code pushed by mentees under winter internship in machine learning @level_infinite
Malicious USB
PASSING MATRICES AS REFERENCES AND MULTIPLYING THEM USING OPERATOR OVERLOADING
Customizable Search Engine for Internet Connected Devices. Module net scanner made with shodan api. [This is also serving as one of the components of the Cyber Sec AI being developed.]
Leaked Mirai Source Code for Research/IoC Development Purposes
because darkoperator took his down for a reason we haven't found yet
An RNN implementation to generate music
Nmap - the Network Mapper. Github mirror of official SVN repository.
Examples for setting up and using elasticsearch in Node.js
This is a container of web applications that work with OWASP Bug Bounty for Projects
This code runs in a cron tab and check regurarly after fixed time interval if the given page is updated or not. if it is , it will mail<using ssmtp> / sms<using twilio api> you the change in it's size <Better serve the code as a boiler plate and make your custom hack scripts >
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Some prank scripts written in Bash
Python Library for PSLab: Pocket Science Lab from FOSSASIA
CTF framework and exploit development library
Includes configuration guide on DHCP Server and PXE server to allow network boot in a local network
PyAIML -- The Python AIML Interpreter
Python Multithreaded Tor Script (Algorithm)
Use these set of srcipts to login to windows system and execute remote commands
Supports rotation of ROT aka Caeser cipher upto 256 asci values. Usefull in some CTF challenges.
The Router Exploitation Framework