Skip to content

Instantly share code, notes, and snippets.

View gahan9's full-sized avatar
:octocat:
Studying

Gahan Saraiya gahan9

:octocat:
Studying
View GitHub Profile
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@gahan9
gahan9 / cheatsheet.md
Created August 26, 2018 04:42
cheatsheet

Git Cheatsheet[^source]

Configure tooling

Configure user information for all local repositories

$ git config --global user.name "[name]"

Sets the name you want attached to your commit transactions

@gahan9
gahan9 / Linux Lab Problems (ce006).md
Last active August 26, 2018 16:41
Linux Lab Problems (ce006)

Lab Assignment

  1. Get name of user as user input and greet it. (Hint: use read and echo)

input

XYZ

output

@gahan9
gahan9 / interviewitems.MD
Created June 22, 2018 18:32 — forked from amaxwell01/interviewitems.MD
My answers to over 100 Google interview questions

##Google Interview Questions: Product Marketing Manager

  • Why do you want to join Google? -- Because I want to create tools for others to learn, for free. I didn't have a lot of money when growing up so I didn't get access to the same books, computers and resources that others had which caused money, I want to help ensure that others can learn on the same playing field regardless of their families wealth status or location.
  • What do you know about Google’s product and technology? -- A lot actually, I am a beta tester for numerous products, I use most of the Google tools such as: Search, Gmaill, Drive, Reader, Calendar, G+, YouTube, Web Master Tools, Keyword tools, Analytics etc.
  • If you are Product Manager for Google’s Adwords, how do you plan to market this?
  • What would you say during an AdWords or AdSense product seminar?
  • Who are Google’s competitors, and how does Google compete with them? -- Google competes on numerous fields: --- Search: Baidu, Bing, Duck Duck Go
@gahan9
gahan9 / BlockChain.md
Last active May 28, 2019 12:01
BlockChain

Proof of Concept(POC)

Methodology used : - Blockchain : - Python/Django

Blockchain  Flow

Figure: Architecture of System

@gahan9
gahan9 / Python Course.md
Last active April 17, 2018 10:31
Python Course

Python for Green Bean[1]

Basic Level

Installation

  • windows
  • linux
@gahan9
gahan9 / Python Course
Last active April 3, 2018 09:50
Python Course
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Python Course</title>
<link rel="stylesheet" href="https://stackedit.io/style.css" />
</head>
@gahan9
gahan9 / gist:7087f2d2a7e4a948fe602a97f6ba3f18
Created March 22, 2018 10:45 — forked from kfigiela/gist:7081994
ffmpeg timelapse / image sequence with video fade in and fade out and audio fade out commandline
ffmpeg -r 20 # input frame rate \
-i "%05d.JPG" # input file pattern \
-i audio.mp3 # input audio file \
-af "afade=t=out:st=132:d=4" # fade out audio for 4 seconds starting at 132 second \
-vf "fade=in:0:40, fade=out:2694:40" # fade in video in first 40 frames, then fade out for 40 frames starting at frame 2694 \
-r 30 # out frame rate is 30s (in that way youtube allows hd movies) \
-s 1280x720 # resize video to hd-ready res \
-vcodec libx264 -threads 4 -profile:v main -preset fast # video encoding settings \
-shortest # output file length should be of shortest input file length (usually audio file will be longer, so we fade out and cut) \
output.mp4 #output file name
@gahan9
gahan9 / Pen Test.md
Last active June 7, 2019 02:15
PenTest.md

Chapter 1: Introduction

About Kali Linux

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.

@gahan9
gahan9 / msfvenom.md
Last active May 1, 2023 03:25
msfvenom intro

Summary

In this Lab, we are going to learn how you can hack an Android mobile device using MSFvenom and Metasploit framework. Here, we will use MSFvenom for generating payload and save as an apk file and setup listener to Metasploit framework. Once user/victim download and install the malicious apk then, an attacker can easily get back session on Metasploit. An attacker needs to do some social engineering to install apk on victim mobile.


We will demonstrate this by using following tools

  • Kali Linux
  • Android emulator
  • Zipalign
  • VMware or Virtual Box (virtual environment)