Nikhil Telase
Python | Web development | ๐ง AI Explorer: Uniting Code and Creativity to Shape Tomorrow's Solutions ๐"
- Report this post
๐ **Exciting News: Introducing My Own Password Manager!** ๐Hey LinkedIn community! ๐ I'm thrilled to share a little project I've been working on โ my very own Password Manager built with Python and Tkinter!๐ **Features:**- Search existing passwords- Generate secure passwords- Save new passwords for your favorite websites๐ป **Tech Stack:**- Python- Tkinter for GUI- JSON for data storage- Random module for password generation๐ **Why did I create this?**Password security is crucial, and I wanted a simple, personalized solution to manage my passwords effectively.๐ **How it works:**1. Enter the website, email, and password.2. Save it securely with a click.3. Retrieve saved passwords whenever needed.๐ **Check it out on GitHub:**https://lnkd.in/gPvm7PM3๐ **Security Measures:**- Password generation with a mix of letters, numbers, and symbols.- Data storage in a JSON file.๐ **Feel free to try it out, contribute, or share your thoughts! Let me know what you think.**#PasswordManager #OpenSource #Python #Tkinter #CyberSecurity #DeveloperLife
7
To view or add a comment, sign in
More Relevant Posts
-
Shaik Rahil
Student at Veltech Dr.RR Dr.SR University
- Report this post
๐ Password Generator and Manager ProjectHey LinkedIn community! ๐ I'm excited to share a project I've been working on recently โ a Password Generator and Manager using Python's Tkinter library!Project Overview:In an era where online security is paramount, I wanted to create a simple yet effective solution for generating and managing strong passwords. So, I built this Password Generator and Manager application using Python. Here's what it does:๐ Password Generation:The app generates complex passwords that include a mix of uppercase and lowercase letters, numbers, and symbols. With just a click, you can create strong passwords for your accounts.๐พ Password Management:You can save these generated passwords along with your website and email details, ensuring that you never lose track of your credentials again.๐ User-Friendly Interface:The user interface is built using Tkinter, making it easy to use and interact with the application.Feel free to check out the code on my GitHub profile ๐ https://lnkd.in/eETU3azt and give it a try yourself. If you have any feedback or suggestions, I'd love to hear from you.#PasswordGenerator #PasswordManager #PythonProjects #Cybersecurity
16
Like CommentTo view or add a comment, sign in
-
Nishar Ansari
Cyber Security Engineer | Ethical Hacker | Azure Cloud Security | Microsoft Security | Network Security |
- Report this post
Join me on GitHub and LinkedIn as I share daily insights on #CyberSecurity for the next 100 days.Day 30Recon-nghttps://lnkd.in/gfVfF-faRecon-ng is a free and open-source tool available on GitHub. Recon-ng is based upon Open-Source Intelligence (OSINT), the easiest and most useful tool for reconnaissance. Recon-ng interface is very similar to Metasploit 1 and Metasploit 2. Recon-ng provides a command-line interface that you can run on Kali Linux. This tool can be used to get information about our target(domain). The interactive console provides several helpful features, such as command completion and contextual help. Recon-ng is a Web Reconnaissance tool written in Python. It has so many modules, database interaction, built-in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open-source web- based reconnaissance can be conducted, and we can gather all information.Use Case: -1. Recon-ng is used to detect the target's IP addresses.2. Recon-ng is used to detect Content Management Systems (CMS) using a target web application.3. Recon-ng contains several modules which we can use to gather information about the target.4. Recon-ng port scanner modules find closed and open ports that are used to maintain access to the server.5. Recon-ng subdomain finder modules are used to find subdomains of a singer domain.6. Recon-ng is used to find information related to the Geo-IP lookup, port scanning, Banner grabbing. Sub-domain information. DNS lookup, reverse IP using WHOIS information.7. It is used to look for error-based SQL injections.#100dayscybersecuritychallenge#cybersecurity
19
2 Comments
Like CommentTo view or add a comment, sign in
-
khushi bansal
Student at Thapar Institute of Engineering and Technology.
- Report this post
Greetings Everyone,I've developed an awesome Random Password Generator interface that will help you keep your online accounts secure. By generating complex and unpredictable passwords, it ensures that your sensitive information is safe from hackers and intruders. Don't wait any longer, try it out now and take control of your online security. I understand that choosing a password size can be overwhelming. But don't worry, I'm here to help. You have the option to select the size that works best for you. Let me know how many characters you'd like your password to be, and I'll make sure it's secure and easy to remember. Firstly, select the number of numerical digits you wish to include in your password, and indicate the number of digits required. The system will then generate a completely random password using Python and Tkinter, two powerful technologies.#python #InternIQ #interniq #tkinter #interships
1
Like CommentTo view or add a comment, sign in
-
Boniface Nwachukwu
Cybersecurity (Penetration Testing), Electrical and Electronic Engineering (Electronics and Computer Engineering Major).
- Report this post
๐New launch: Python3-Scapy Packet Sniffer ๐We, Team Hacks (comprise OLUWADAMILARE ABOLAJI, the team lead, Emmanuel Emeka Junior, Ajibade Oluwapelumi Asher, Chinedu Ude Otisi, favour unuaru, Cornelius Adelowo and Ogbeuhi Kelechi) under my guidance and supervision successfully created a Packet Sniffer using Python3 and the powerful Scapy library. This tool is essential for network administrators and cybersecurity professionals for monitoring network traffic, troubleshooting issues, and detecting security breaches.Disclaimerโ ๏ธ Disclaimer: This tool is intended for educational purposes and authorized penetration testing only. Unauthorized use of this tool on networks without explicit permission is illegal and unethical.Project OverviewA packet sniffer captures and analyzes network packets traveling across a network, providing invaluable insights into network behavior and potential security threats.Objectives1. Utilize Scapy: Leverage the Scapy library in Python3 to capture and analyze network packets.2. Implement Packet Filtering: Capture specific types of network traffic for targeted analysis.3. Analyze Captured Packets: Extract and display relevant information for detailed network analysis.Tools and Environment- Python3: Programming language used for developing the packet sniffer.- Scapy: Python library for network packet manipulation and analysis.- Operating System: Preferably Linux for better network interface control, though Windows is also supported with appropriate permissions.PrerequisitesEnsure Python3 and Scapy are installed. For Kali Linux, both are typically pre-installed. Otherwise, you can install Scapy using pip:Potential Enhancements1. GUI: Develop a graphical user interface for easier interaction and visualization.2. Packet Logging: Store captured packets for later analysis.3. Advanced Filtering: Implement sophisticated filtering based on packet contents or patterns.4. Performance Optimization: Optimize packet handling for high-traffic networks.5. Extended Protocol Support: Add support for additional protocols like ICMP, HTTP, and DNS.ConclusionThe packet sniffer created with Python3 and Scapy met the primary objectives and showcased the utility and power of the Scapy library in network programming and analysis. Future enhancements can make this tool even more robust for network monitoring and security analysis.To access the raw file of the tool chekc this: https://lnkd.in/dVaDHsvn#Cybersecurity #PacketSniffer #Python3 #Scapy #NetworkSecurity #EthicalHacking #TechInnovationsScreenshot showing the tool at work:
49
13 Comments
Like CommentTo view or add a comment, sign in
-
Ranjeet Kumar
Cyber Security Student Seeking Full Time Job in Cyber Security | Cloud Security | Network Security | Penetration Testing
- Report this post
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web applicationโs database server.The impact SQL injection can have on a business is far-reaching. A successful attack may result in the unauthorized viewing of user lists, the deletion of entire tables, and, in certain cases, the attacker gaining administrative rights to a database, all of which are highly detrimental to a business.In this course, you will perform SQL injection attacks on websites.I Learn This CourseLearn basics of SQL Injection attacksLearn to use kali linux database Penetration testing toolsLearn to perform SQL Injection attacks#sqlinjection #python #sqlserver #kalilinux #cybersecurity #sql #hacking #hacker #linux #technology #sqldeveloper #pentesting #ethicalhacker #programming #networking #ethicalhacking #sqldatabase #coder #tech #google #infosec #windows #database #microsoft #java #mysql #datascience #techie #geek #cybernews
3
Like CommentTo view or add a comment, sign in
-
Jean Joelle Villanueva
- Report this post
Someone has been trying to access my personal Microsoft account over the past few days. I don't know how they got my password correct, but I'm glad I activated my multi-factor authenticator.This incident highlights the importance of activating MFA for all your socials and accounts. It adds an extra layer of security, even if attackers try to brute force your passwords.On a related note, I recently implemented the MFA feature on Charlee.ai web application, and I am very proud of the result! ๐#softwareengineering #python
13
2 Comments
Like CommentTo view or add a comment, sign in
-
Okan YILDIZ
Senior Security Engineer / Senior Software Developer | CEH | CCISO | CTIA | CASE.NET | ECIH | APT |
- Report this post
๐ Excited to share this comprehensive guide that's a goldmine for cybersecurity professionals and IT enthusiasts! This cheat sheet is an essential toolkit for understanding and implementing reverse shells effectively.๐ What's Inside:Tools Galore: From Awk to Socat, explore a vast array of tools for reverse shell operations.Programming Languages: Dive into examples across Bash, C, Dart, Golang, Java, Lua, NodeJS, Python, Ruby, and more.Platform-Specific Shells: Insights into Windows and Linux shells, including staged and stageless TCP.Specialized Tools: Uncover the potential of Ncat, Netcat, OpenSSL, Perl, PHP, Powershell, Telnet, and Meterpreter Shell.Spawn TTY Shell: Learn the intricacies and applications in various scenarios.Comprehensive References: A rich collection of resources to deepen your understanding.๐ฅ Whether you're deploying advanced cybersecurity measures or honing your hacking skills, this cheat sheet is an invaluable resource!#Cybersecurity #ReverseShell #ITSecurity #Hacking #Netcat #Python #Ruby #BashScripting #Powershell #LinuxSecurity #WindowsSecurity #InfoSec #PenetrationTesting #CyberDefense
88
Like CommentTo view or add a comment, sign in
-
Grace Kim
M.S. in Information Systems | Cybersecurity | Georgia State University |
- Report this post
Day 10 of TryHackMe Advent of Cyber 2023: SQL InjectionSunday Funday with Professor Roger WhyteToday's challenge was on SQL injection. SQL is a structured query language used to manage databases and to build websites.PHP is used for web development. It connects between frontend and backend where SQL is.SQL injection is an attack where an attacker injects malicious SQL code into a web application. This can lead to unauthorized access, data manipulation, or data destruction. #tryhackme #cybersecurity #sql #sqlinjection #php
19
3 Comments
Like CommentTo view or add a comment, sign in
-
Haripriya Bojja
CSE(AI&ML)'26|Student at Gayatri Vidya Parishad College of Engineering for Women
- Report this post
Hello Everyone ๐ I've successfully completed my another project of #oasisinfobyte i.e.Password Generator.Enhance your online security with our Password Generator, a reliable tool designed to create strong, unique passwords for all your accounts. Protect your sensitive information from potential threats with passwords that are difficult to crack.๐You can also check this project on GitHub:https://lnkd.in/ghQKvKYf#python#password_generator#oasisinfobyte
12
3 Comments
Like CommentTo view or add a comment, sign in
-
Sylvester Roshan
Attended London Metropolitan University
- Report this post
๐ Introducing My Password Manager Application using SQLite! ๐๐น Features:Add Password: Securely store website credentials with encryption.Get Password: Retrieve username and password securely with decryption.Delete Password: Remove credentials with a single click.๐ง Technologies Used:Backend: Flask for the web frameworkDatabase: SQLite for data storageEncryption: cryptography.fernet for secure password encryption๐ก Key Highlights:Seamless form handling with Bootstrap for a responsive design.Flash messages for user feedback and enhanced UX.Secure data handling with encryption ensuring data privacy.Github Repo ๐ https://lnkd.in/eDe_Ttt7Check out the demo video to see how it works! ๐#PasswordManager #Flask #SQLite #Cryptography #WebDevelopment #Python #CyberSecurity #TechInnovation #Python #TechTrends #ProfessionalGrowth #SkillsDevelopment
23
2 Comments
Like CommentTo view or add a comment, sign in
3,879 followers
- 129 Posts
View Profile
FollowExplore topics
- Sales
- Marketing
- Business Administration
- HR Management
- Content Management
- Engineering
- Soft Skills
- See All