Aashiq Ramachandran's repositories
i-am-a-bot
An Multi-Modal LLM Powered Agent to automatically solve Captchas
my-precious-pii
GPT 2 model trained on fake PII to study PII leakage from large language models
owa-honeypot
A modified version of the owa-honeypot to for easy setup on AWS linking to Kibana
E-Aadhar
there is a default password mechanism for every E-Aadhar file. This is the first 4 letters of our name in capital letters followed by our year of birth. Once we know this we are able to create a wordlist consisting of common indian names and years of birth over the last century. With this wordlist at hand all we would need to do is run a simple brute force attack [F-Crack] with the above mentioned wordlist and we can crack any E-Aadhar card.
ml-model-data-leak-layer
Robust layer for detecting PII leaks in LLM-generated content, employing ML and regex pattern matching to ensure data privacy
awesome-crawler
A collection of awesome web crawler,spider in different languages
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
awesome-linux-containers
A curated list of awesome Linux Containers frameworks, libraries and software
awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Awesome-SOAR
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
embedchain
Personalizing LLM Responses
foolbox
A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX
honeypots-setup-steps
A simple document highlighting how to setup the honeypots honeypot on a AWS EC2 machine
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
lazyweb
This web application is a demonstration of common server-side application flaws. Each of the vulnerabilities has its own difficulty rating.
mutillidae
OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, security enthusiasts, classrooms, CTF, and vulnerability assessment tool targets.
phishing_url
A streamlit application that can take in a url and will classify it as a phishing site or safe site.
searchme
Search Through PDF Docs
taxii-polling-juypter
A simple jupyter notebook to poll data from a TAXII 2.1 server
vercel-takeover
Sample Index for Vercel Takeover Vulnerability