Skip to content
View zedxpace's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report zedxpace

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
zedxpace/README.md

Hi there! 👋 I'm Saransh Arora

I'm a passionate Software Engineer. I love diving into challenging problems and crafting elegant solutions.

🌱 Currently, I'm exploring PeerToPeer Systems , Deeplearning and many more , and hoping to build something incredible one day.
💼 I'm open to collaborations and new opportunities.
📫 You can reach me at :
        LinkedIn : www.linkedin.com/in/imsaransh
        Blog : https://www.codexpace.in/2022/01/python-for-security-hacking.html
        Youtube Channel : https://youtube.com/playlist?list=PLO-kZAQx60GC6c2Rt9soW75TofTM4aE9U&si=hW_csJG_7iwkFFEi

Pinned Loading

  1. bluetooth-hacking- bluetooth-hacking- Public

    This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.

    Python 135 19

  2. Python-Keylogger Python-Keylogger Public

    This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipboard and appends them in the keylogs file

    Python 12 5

  3. Trojan-in-Python Trojan-in-Python Public

    This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which …

    Python 11 3

  4. SandboxDetection-with-python SandboxDetection-with-python Public

    This repo explains the process of sandboxing with python as It is a computer security term reffering to when a program in set aside from other progams in a seprate environment so that if errors or …

    Python 5 2

  5. screen-shot-in-python- screen-shot-in-python- Public

    This script will take screenshot and save it to the specified location . you can either use it in building trojans or you can use some other ways please.

    Python 2 1

  6. hacking-and-security-with-python-and-c-code- hacking-and-security-with-python-and-c-code- Public

    This page will contain all the links to the script and exploits built from scratch in python as well as c code.

    2 1