Skip to content
View sujayadkesar's full-sized avatar
⚛️
learning
⚛️
learning
Block or Report

Block or report sujayadkesar

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
sujayadkesar/README.md

01101000 01101001 There 👋, I'm SUJAY ADKESAR



A Seasoned Web application penetration tester👨‍🏫 | CTF Player | Threat Intelligence🧠 | Cybersecurity | Penetration testing 💻| Hobby Front-End. Thursty to learn and explore new technologies and share the knowledge back to the community⚛️.



sujayadkesar

👨‍💻 Here's My portfolio site https://sujayadkesar.live & terminal-styled

📝 I regularly write CTF walkthroughs on https://thelocalh0st.github.io

📄 Know about my experiences here!!


Connect with me:

sujay_adkesar sujay_adkesar sujay_adkesar sujay_adkesar




Languages and Tools:

arduino azure bootstrap c css3 docker express git heroku html5 java javascript linux mongodb mysql nodejs postman python

     

Badges🚀

⚙️My GitHub Stats:

sujayadkesar's GitHub stats

GitHub Commits Graph

Top Languages

🧑‍💻Top Repositories
















Popular repositories

  1. cybersecurity-resources cybersecurity-resources Public

    Cybersecurity Resources

    227 31

  2. Linux-Privilege-Escalation Linux-Privilege-Escalation Public

    All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs

    C 16

  3. reverse-shell-generator reverse-shell-generator Public

    A python based tool which dynamically generate the reverse-shell payload based on the user requirements🛡️💻

    Python 5 1

  4. auto-rec0n auto-rec0n Public

    Auto Recon is a Bash script for automating the reconnaissance phase of penetration testing. It performs various types of scans to gather information about the target domain, including IP details, d…

    Shell 5 2

  5. terminal_portfolio terminal_portfolio Public

    portfolio in terminal style created by only html css and javascript with diffrent themes aswell as shortcuts and autocomplete commands features.

    JavaScript 4 4

  6. web-dork web-dork Public

    In the context of web application penetration testing, Google Dorks can be used to find vulnerabilities and sensitive information in websites. This involves searching for specific keywords or file …

    HTML 4 2