Abhishek Gautam's repositories
Router_Security
Routers are the most common networking Devices which can be seen everywhere, it's one of the most attacked networking devices so it's important to known the existing vulnerabilities and how to exploit it and how to secure it
Btach_Scripting
cool Batch scripts like bypass UAC
Nmap_usage
This tells us about how to use nmap and in what differnt ways can the nmap for better scanning of the ports and also briefs about which options we should enable for which kind of host
Whatsapp_End-to-End-Encryption
How whatsapp's new end to end encryption work
Algorithms
Various different types of algorithms to solve different types of problem which we come through while solving problems or writing programs.
Computer_ports
Computer Hardware and Software Ports
Google_Around_operator
Around Google Dork
Python_Port_Scanner
Port Scanner are one of important tools used in penetration testing and used majorly for information gathering and helps decide exploits based on open ports present in host. This script does a port scanning on the specified host it takes 3 arguments as input out of which 2 are optional and tries to check for open ports
Python_Scripts
This repository contains Solution of learning python the hard Way and other python scripts as well
C_Programs
This repository contains the C programs which every beg must make to get his hands on C
Data_Structures_Using_C
Implementation Of Different Types of data types using c programming
Dhcp_Starvation_Attack
Demonstration of how to perform the DHCP Starvation attack to starve it, so that no new user is able to connect to the network
Footprintig
Basics of what is footprinting and how to perform it in more organized and efficient manner so as to achieve better results.
Incident_Response
A quick guide to incident response. Incident can be of many types and each has different implications on the ongoing processes and each should be dealt in a different way and separate actions much be taken as per the incidents. This is the work of incident response team of an organization
OWASP_TOP_10_-_WINDOWS_FIREWALL
Owasp is the biggest organization which monitors the web vulnerability, So this is a tutorial of how to perform the exploits and then the analysis of the technical and business implications of the exploits.
Qrl_Jacking_attack
Qrl jacking attacks and mitigations from it and tips to save your self from such vectored attacks
Security_Checklist
security checklists
Smart_Girds
Identifying and Resolving Major Problems within the Smart Grid System