Priyank Vadaliya (@priyankvadaliya)
  • Stars
    star
    154
  • Global Rank 150,286 (Top 6 %)
  • Followers 49
  • Following 137
  • Registered over 11 years ago
  • Most used languages
    Python
    50.0 %
    PHP
    37.5 %
    Shell
    12.5 %
  • Location ๐Ÿ‡ฎ๐Ÿ‡ณ India
  • Country Total Rank 4,336
  • Country Ranking
    Shell
    392
    PHP
    1,160
    Python
    2,122

Top repositories

1

AwsomeOSINT

Awesome OSINT stuff
70
star
2

Zip-Cracker-

Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline
Python
39
star
3

Hack-Captive-Portal

This script helps to pass through the captive portals in public Wi-Fi networks. It hijacks IP and MAC from somebody who is already connected and authorized on captive portal.
Shell
29
star
4

Mysql-php-Crud-Operation

In this Mini Project, I will be presenting a complete CRUD system containing login and register feature. User should register himself first. And then he can add data after logging in.
PHP
7
star
5

Snipper-Scanner

Vulnerability scanner
Python
3
star
6

PassChaser

Passchaser is a simple tool for searching of default credentials for network devices, web applications and more
Python
1
star
7

QA-rtcamp

PHP
1
star
8

Redirect-detective

python script which can show complete redirection list and target URL for a given URL.
Python
1
star
9

Business-model-of-cloud-computing

Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. They also standardize data access procedures to prevent insiders to disclose the information without permission. In cloud computing, the data will be stored in storage provided by service providers. Service providers must have a viable way to protect their clientsโ€™ data, especially to prevent the data from disclosure by unauthorized insiders. Storing the data in encrypted form is a common method of information privacy protection. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously obtain encrypted data and decryption keys. This allows them to access information without authorization and thus poses a risk to information privacy. This study proposes a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext, and the party responsible for data encryption and encryption must delete all data upon the computation on encryption or decryption is complete. A CRM (Customer Relationship Management) service is described in this project as an example to illustrate the proposed business model.
PHP
1
star