Vinayak Patil (vinayakrit)

vinayakrit

Geek Repo

Company:Accenture

Location:India

Github PK Tool:Github PK Tool

Vinayak Patil's repositories

Blockchain-certicate-verify

Document authentication in Educational Field using Blockchain Technology - Traditional way to authenticate educational certificate is time consuming, may require third party to verify certificates, chances certificates alter/fraud. So to avoid such issues I developed this project where I used Blockchain technology and IPFS. So idea is simple, university will store certificates on IPFS and make transaction of same through university's smart contract. So of that students can verify heir certificates either using digital copy of certificate or hash provided by university. Everything is securely processed and their is no chance fraud or alter of certificate, if done smart contract return negative response.

Language:JavaScriptStargazers:5Issues:1Issues:2
Language:JavaLicense:MITStargazers:1Issues:1Issues:0

AllAboutBugBounty

All about bug bounty (bypasses, payloads, and etc)

Stargazers:0Issues:0Issues:0

credit-card-checker

CC validation using java language based on Luhn algorithm

Language:JavaStargazers:0Issues:0Issues:0

java-enc

code written in java to encypt and decrypt message. Based on AES.

Language:JavaStargazers:0Issues:0Issues:0

lazy-ftp

Enables FTP

Language:ShellLicense:MITStargazers:0Issues:0Issues:0
Language:ShellStargazers:0Issues:1Issues:0

deleted

This is my website

Stargazers:0Issues:1Issues:0

embeddedXSS

toTestXSSEmbedded

Language:HTMLStargazers:0Issues:0Issues:0

fuzzdb

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

Language:PHPStargazers:0Issues:0Issues:0
Language:JavaStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0
Language:HTMLStargazers:0Issues:1Issues:0

Name-Style

Java code To make String like Ⓗⓔⓨ ⓣⓗⓔⓡⓔ Ⓘ ⓐⓜ ⓤⓢⓘⓝⓖ ⓌⓗⓐⓣⓢⒶⓟⓟ

Language:JavaStargazers:0Issues:1Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Language:PHPLicense:MITStargazers:0Issues:0Issues:0
Language:ShellStargazers:0Issues:2Issues:0
Language:CSSStargazers:0Issues:0Issues:0