Saket Upadhyay's starred repositories
linux-insides
A little bit about a linux kernel
MonitorControl
🖥 Control your display's brightness & volume on your Mac as if it was a native Apple Display. Use Apple Keyboard keys or custom shortcuts. Shows the native macOS OSDs.
markdown-badges
Badges for your personal developer branding, profile, and projects.
Infinite-Storage-Glitch
ISG lets you use YouTube as cloud storage for ANY files, not just video
google-ctf
Google CTF
Fuzzing101
An step by step fuzzing tutorial. A GitHub Security Lab initiative
maldev-for-dummies
A workshop about Malware Development
backdoor-learning-resources
A list of backdoor learning resources
python-exe-unpacker
A helper script for unpacking and decompiling EXEs compiled from python code.
Malware-analysis-and-Reverse-engineering
Some of my publicly available Malware analysis and Reverse engineering.
aptsources-cleanup
Detects and interactively deactivates duplicate Apt source entries and deletes sources list files without valid enabled source entries (as requested in https://askubuntu.com/a/762815/175814).
sandsifter
The x86 processor fuzzer
cave_miner
Search for code cave in all binaries
ibm-quantum-challenge-fall-2021
For IBM Quantum Challenge Fall 2021
rustdsplit
At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypass signature-based AV. The tool I used back then is gone, so I wrote this.
hardwareSecurity
hardware security course from Coursera and University of Maryland
hardware_boot_selection_switch
Hardware Boot Selection Switch Using Raspberry Pi PICO
juliet-dynamic
Juliet C/C++ Dynamic Test Suite
Android-Permission-Extraction-and-Dataset-Creation-with-Python
One script to create a permission-based dataset of android applications for your next ML Malware Detection gizmo.
Native-Android-Examples
Basic Android Native Library Examples for Beginners (JNI via C++ Libraries)
face_remover
Face / EXIF metadata removal script