-
QA Consultant
- West Bengal, India
-
16:12
(UTC +05:30) - in/sayak-naskar
Highlights
Stars
Master programming by recreating your favorite technologies from scratch.
Real-ESRGAN aims at developing Practical Algorithms for General Image/Video Restoration.
ECCV18 Workshops - Enhanced SRGAN. Champion PIRM Challenge on Perceptual Super-Resolution. The training codes are in BasicSR.
POM framework using Robot Framework
A list of resources for those interested in getting started in bug bounties
Make your first Pull Request on Hacktoberfest 2024. Don't forget to spread love and if you like give us a ⭐️
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
A tool to dump the login password from the current linux user
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
Collection of methodology and test case for various web vulnerabilities.
Face Mask Detection system based on computer vision and deep learning using OpenCV and Tensorflow/Keras
A collection of personal scripts used in hacking excercises.
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
Get all possible href | src | url from target url or domain
🚪✊Knock Knock: Get notified when your training ends with only two additional lines of code
Poor (rich?) man's bug bounty pipeline https://dubell.io
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
Virtual walks in Google Street View using PoseNet and applying Deep Learning models to recognize actions.
Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode
A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
A list of universities with vulnerability disclosure policies
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.