Hello World!!!

I'm Sanath
Programmer/ Hacker /Web Developer

About me

Hello World! You got over here? Then probably you should be knowing about me!

No worries though!

I am a programmar/ full stack developer/ and even a hacker.It's almost been two years since i started my Computer Science Degree.The journey is being wonderful with quite interesting stuff making my head banging over the my computer desk and lot yet to be done.But trust me you'll programming.By the way iam pursuing my degree in Indian Institute of Information Technology Kalyani.

Being quite curious and enthusiastic made myself to grow around here and feel comfortable.Apart from these assignments,exams and boring routine stuff i made my interest in projects which is leading me to quite different places rather than others. I feel like to grab this technological world but success is never been so easy.But never mind, i'll be at it one day.

PHP
Javascript
JQUERY
Python
C
HTML5
CSS3
SQL

Skills

Programming

Webdevelopment

Designing


Would you like to know more or just discuss something?

Contact me

5
Websites
20
Minor Projects
5
Major Projects
50
Magazines and Brochures

My work

I have worked on dozens of projects so I have picked only the latest for you.

×

Injecting malicious file using Ftp

Injecting malicious file using python

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).

Read More Github Download case study

SSH Botnet

Secure Shell Botnet using python

A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data,send spam, and allows the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software. The word "botnet" is a combination of the words "robot" and "network". The term is usually used with a negative or malicious connotation.

Telnet botnets use a simple C&C botnet Protocol in which bots connect to the main command server to host the botnet. Bots are added to the botnet by using a scanning script, the scanning script is run on an external server and scans IP ranges for telnet and SSH server default logins. Once a login is found it is added to an infection list and infected with a malicious infection line via SSH on from the scanner server. When the SSH command is run it infects the server and commands the server to ping to the control server and becomes its slave from the malicious code infecting it. Once servers are infected to the server the bot controller can launch DDoS attacks of high volume using the C&C panel on the host server.

Read More Github Download case study

Wifi Password Hacking

Hacking Wifi using aircrack

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Aircrack-ng comes pre installed with kali linux .

If your are running an linux system you install aircrack-ng by running the below command
sudo apt install aircrack-ng

WPA2 wifi use strong encryption algortithm but not unbreakable.WPA2 wifi share its password in a 4 way handshake.So we prepare ourselves for a handshake and crack the encrypted password

Download the commands file to see the complete list.

Read More Github Download case study

Bruteforce

Make your own password cracker using python

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. Brute force attacks may be used by criminals to crack encrypted data, or by security analysts to test an organization's network security. A brute force attack is also known as brute force cracking or simply brute force.

Here we use mechanize library to bruteforce online websites

Read More Github Download case study

We Chat

Chatting application using php

Wechat is an web chatting application which is completely consructed using PHP and SQL database.The application is constructed in such a way that it is divided into six chat rooms of different fields in which they could seperately chat regarding respective fields. Code available on github

Github

Guesthouse Management

Guesthouse management using php

Guesthouse management system makes easy for the users to access and avail bookings online.This web application is completely using php and sql database. The application code is made available on github if neccessary

Github

Rhyzens

Rhyzens is an ngo organization ...

Rhyzens is an NGO organization set up by a group of medicos.The website for the organization is completely through HTML5,CSS3 and JavaScript

Visit website Github

Select theme colour

Stylesheet switching is done via JavaScript and can cause a blink while page loads. This will not happen in your production code.