Open in app

Sign in

Write

Sign in

Shivam Chaudhary
Shivam Chaudhary

16 Followers

Home

About

Pinned

Mob CC

Mob CC is a post-exploitation framework containing a Linux kernel rootkit, C2 server, and Reverse shell with network scanning capabilities. This post-exploitation framework is for learning purposes, and everything is ready to use. Install the libraries, Deploy the server, and install rootkits inside the system using the listed commands. …

Linux Kernel

5 min read

Mob CC
Mob CC
Linux Kernel

5 min read


Pinned

Tokyo Revengers (THM)

A simple Try Hack Me room inspired by anime Tokyo Revengers — Follow the link below to try this CTF challenge based on Ubuntu and vulnerabilities like LFI, Information Disclosure, etc. TryHackMe | Cyber Security Training TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your…www.tryhackme.com As this is my first Tryhackme room, I would like to apologize in advance for any mistakes I may have made while creating it. While exploiting the LFI vulnerability on certain…

Tryhackme

5 min read

Tokyo Revengers (THM)
Tokyo Revengers (THM)
Tryhackme

5 min read


Pinned

Automatic Lecture Planner using Genetic Algorithm

Planning Lectures or Creating Timetable is a very tedious thing to do, but a very basic and important task for every Educational Institute and other organizations also. So, there are many ways to do that automatically (using Computers). There are many way to do that, and we can do it…

Genetic Algorithm

4 min read

Automatic Lecture Planner using Genetic Algorithm
Automatic Lecture Planner using Genetic Algorithm
Genetic Algorithm

4 min read


Pinned

Image Steganography

StegMe is an application which uses Image steganography technique to maintain the Message Secrecy… Image Steganography is a technique in which we can hide the existence of a message into an Image. Most of the message can be of any type (eg:. Text, Audio, Video, Image etc.) But here we’re…

Image

3 min read

Image Steganography
Image Steganography
Image

3 min read


Sep 6, 2022

Winning SIH 2022 (Smart India Hackathon)

As of now, I have participated in several hackathons. And we know what they are searching for in these hackathons. A simple problem that almost everyone in the community faces is the root. After realizing the problem, we think of an idea to overcome that problem in real life. But…

Sih 2022

4 min read

Winning SIH 2022 (Smart India Hackathon)
Winning SIH 2022 (Smart India Hackathon)
Sih 2022

4 min read


Jun 17, 2022

Rural India Business Conclave 2.0

Hackathon organized by Kerala Startup Mission Hello There! This is Shivam, just an average programmer, and Cyber Security Enthusiast. …

Ribc

3 min read

Rural India Business Conclave 2.0
Rural India Business Conclave 2.0
Ribc

3 min read


Jun 27, 2021

Building Keyloggers using C++

Understanding the Keylogger… Keylogging (also known as : Keystroke logging and Keyboard capturing) is the process of recording (logging) the key pressed on the keyboard (usually others). …

Keylogger

3 min read

Building Keyloggers using C++
Building Keyloggers using C++
Keylogger

3 min read

Shivam Chaudhary

Shivam Chaudhary

16 Followers

Cyber Security professional with Football skills… https://shvom.pythonanywhere.com

Following
  • Prakash Ravi

    Prakash Ravi

  • Jayanta Kumar Pal

    Jayanta Kumar Pal

  • Kishan Kartha

    Kishan Kartha

  • Mukut Chakraborty

    Mukut Chakraborty

  • Simran Kaur

    Simran Kaur

See all (17)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams