Aashiq Ramachandran (AashiqRamachandran)

AashiqRamachandran

Geek Repo

Company:Cyware Labs

Location:Chennai

Home Page:linkedin.com/in/aashiq-ramachandran

Github PK Tool:Github PK Tool

Aashiq Ramachandran's repositories

i-am-a-bot

An Multi-Modal LLM Powered Agent to automatically solve Captchas

Language:PythonLicense:MITStargazers:67Issues:1Issues:0

DorkDB

A community driven project, which scrapes GHDB for all dorks, searches each dork on google and returns every discovered site to a database, thus allowing you to create a huge database of almost all vulnerable sites.

Language:PythonStargazers:2Issues:0Issues:0

cam

A twitter bot, which can automatically find people based of keywords or hash tags they tweet with, read and understand the tweet, build a custom reply with a malicious link and reply to them with the generated reply.

Language:PythonStargazers:1Issues:1Issues:0

my-precious-pii

GPT 2 model trained on fake PII to study PII leakage from large language models

Language:HTMLStargazers:1Issues:0Issues:0

owa-honeypot

A modified version of the owa-honeypot to for easy setup on AWS linking to Kibana

Language:HTMLLicense:Apache-2.0Stargazers:1Issues:0Issues:0
Language:JavaStargazers:1Issues:0Issues:0

E-Aadhar

there is a default password mechanism for every E-Aadhar file. This is the first 4 letters of our name in capital letters followed by our year of birth. Once we know this we are able to create a wordlist consisting of common indian names and years of birth over the last century. With this wordlist at hand all we would need to do is run a simple brute force attack [F-Crack] with the above mentioned wordlist and we can crack any E-Aadhar card.

Language:PythonStargazers:0Issues:0Issues:0

ml-model-data-leak-layer

Robust layer for detecting PII leaks in LLM-generated content, employing ML and regex pattern matching to ensure data privacy

Language:PythonStargazers:0Issues:0Issues:0

awesome-crawler

A collection of awesome web crawler,spider in different languages

License:MITStargazers:0Issues:0Issues:0

awesome-cybersecurity-blueteam

:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.

Stargazers:0Issues:0Issues:0

awesome-linux-containers

A curated list of awesome Linux Containers frameworks, libraries and software

License:Apache-2.0Stargazers:0Issues:0Issues:0

awesome-security

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

License:MITStargazers:0Issues:0Issues:0

Awesome-SOAR

A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.

Stargazers:0Issues:0Issues:0

awesome-threat-intelligence

A curated list of Awesome Threat Intelligence resources

License:Apache-2.0Stargazers:0Issues:0Issues:0

Azure-Sentinel

Cloud-native SIEM for intelligent security analytics for your entire enterprise.

Language:Jupyter NotebookLicense:MITStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0
Language:JavaStargazers:0Issues:0Issues:0

embedchain

Personalizing LLM Responses

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0

foolbox

A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX

Language:PythonStargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:0Issues:0

honeypots-setup-steps

A simple document highlighting how to setup the honeypots honeypot on a AWS EC2 machine

Stargazers:0Issues:0Issues:0

juice-shop

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

Language:TypeScriptLicense:MITStargazers:0Issues:0Issues:0

lazyweb

This web application is a demonstration of common server-side application flaws. Each of the vulnerabilities has its own difficulty rating.

License:MITStargazers:0Issues:0Issues:0

Marketer

An alternative version of CAM whose main purpose is not to phish targets, but aid and enhance social media marketing activities by, increasing chatter about the said topic, and sharing the given link.

Language:PythonStargazers:0Issues:1Issues:0

mutillidae

OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, security enthusiasts, classrooms, CTF, and vulnerability assessment tool targets.

License:GPL-3.0Stargazers:0Issues:0Issues:0

phishing_url

A streamlit application that can take in a url and will classify it as a phishing site or safe site.

License:MITStargazers:0Issues:0Issues:0

searchme

Search Through PDF Docs

Language:PythonStargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:0Issues:0

taxii-polling-juypter

A simple jupyter notebook to poll data from a TAXII 2.1 server

Language:Jupyter NotebookStargazers:0Issues:0Issues:0

vercel-takeover

Sample Index for Vercel Takeover Vulnerability

Language:HTMLStargazers:0Issues:0Issues:0