Skip to content
View shrush7's full-sized avatar

Block or report shrush7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
shrush7/README.md

Banner

Hello, I'm Shrushti

About Me

I am a Artificial Intelligence and Data Science student with a passion for cybersecurity and open-source projects.

🔧 Technologies & Tools

Git GitHub Kali Linux OpenVAS Nmap HTML CSS JavaScript PHP Bash Python

🚀 Projects

  • qwertmachsec - my website
  • insecure_xss - A deliberately vulnerable web application with insecure XSS filters.
  • Arbitary_code_execution - A vulnerable web application that is susceptible to arbitrary command execution.
  • exposed_phpinfo - A simple PHP web application with an exposed php.info page.
  • PHP_web_shell - A PHP backdoor accessible via your browser, that allows you to execute malicious commands on the compromised web server.
  • nodekeylogger - simple linux node keylogger
  • CODSOFT - codsoft internship

💬 Connect with Me

LinkedIn Twitter Email

Pinned Loading

  1. qwertmachsec qwertmachsec Public

    JavaScript

  2. Arbitary_code_execution Arbitary_code_execution Public

    A vulnerable web application that is susceptible to arbitrary command execution.

    JavaScript

  3. exposed_phpinfo exposed_phpinfo Public

    A simple PHP web application with an exposed phpinfo.php page.

    PHP

  4. insecure_xss insecure_xss Public

    A deliberately vulnerable web application with insecure XSS filters.

    PHP

  5. nodekeylogger nodekeylogger Public

    Simple node.js linux only keylogger using events.

    JavaScript

  6. PHP_web_shell PHP_web_shell Public

    A PHP backdoor accessible via your browser, that allows you to execute malicious commands on the compromised web server.

    PHP