Home
Projects Blog About
Infra-Security 101

A checklist to follow when assessing a client's internal infrastructure for security & compliance testing. It is advised to focus more on the Active Directory section to get maximum information out of it for further attacks and enumeration.

Red TeamReconNetworkAD

Keylogger Spyware

Keylogger is the action of recording the key strikes on a keyboard so that the person using the keyboard is unaware of their actions that are being monitored.

HackingSpywareMalware

Parking Detection System

Built the Machine Learning model using VGG16. Developed the Flask and NodeJS API to communicate with the ML model. Hosted the entire backend infrastructure on various cloud platforms like Microsoft Azure, AWS and Linode.

DevelopmentSecurityMLBackend

Recon scripts

A simple script to automate the process of asset discovery using different open source tools.

HackingReconBug Bounty

Smart Contract Attacks

Learning web3 related attacks

HackingCode ReviewWeb3

Web Application Crawler

Basically, crawls any website and give us the detailed information about it.

HackingReconBug Bounty

with by Akshay Shinde
theme portfolYOU