Skip to content
View Sparshkhare1306's full-sized avatar

Block or report Sparshkhare1306

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Sparshkhare1306/README.md
  • πŸ‘‹ Hi, I’m @Sparsh Khare.
  • πŸ‘€ I’m interested in Ml/AI and Software Development security. I have extensive experience in research and the tech industry.
  • 🌱 When I'm not completing assignments, I'm probably learning new skills or reading books.
  • πŸ’žοΈ I’m looking for new tech opportunities that allow me to work on read world applications and apply my skills to deliver meaningful results.
  • πŸ“« How to reach me: Email me at kharesparsh1306@gmail.com or connect with me on LinkedIn at https://www.linkedin.com/in/kharesparsh/
  • πŸ“• Look at my research work here: https://www.researchgate.net/profile/Sparsh-Khare-2?ev=hdr_xprf

Popular repositories Loading

  1. Sparshkhare1306 Sparshkhare1306 Public

    Config files for my GitHub profile.

    Jupyter Notebook

  2. SEED-LABS-1 SEED-LABS-1 Public

    Here is the implementation of SEED Labs 1: Return to libc attack. The whole execution was done on Github codespaces although, I would suggest oracle VM for this. Let me know if it helps.

  3. SEED-labs-2 SEED-labs-2 Public

    The SEED lbs 2 tasks execution. The lab shows successful execution of buffer overflow tasks.

  4. SEED-LABS-3 SEED-LABS-3 Public

    The SEED lbs 3 tasks execution. The lab shows successful execution of Format String Vulnerability.

  5. SEED-LABS-4 SEED-LABS-4 Public

    Here is the implementation of SEED Labs 4: XXS attack.

  6. SEED-LABS-5 SEED-LABS-5 Public

    Here is the implementation of SEED Labs 5: SQL Injection. The execution was done on Oracle VM. Refer to the SEED labs website for files or any other resources.