- π Hi, Iβm @Sparsh Khare.
- π Iβm interested in Ml/AI and Software Development security. I have extensive experience in research and the tech industry.
- π± When I'm not completing assignments, I'm probably learning new skills or reading books.
- ποΈ Iβm looking for new tech opportunities that allow me to work on read world applications and apply my skills to deliver meaningful results.
- π« How to reach me: Email me at kharesparsh1306@gmail.com or connect with me on LinkedIn at https://www.linkedin.com/in/kharesparsh/
- π Look at my research work here: https://www.researchgate.net/profile/Sparsh-Khare-2?ev=hdr_xprf
Computer Science researcher with a knack for implementing AI in solutions β I speak Python and a little Parseltongue! π
-
Florida State University
- Tallahassee
- in/kharesparsh
Popular repositories Loading
-
-
SEED-LABS-1
SEED-LABS-1 PublicHere is the implementation of SEED Labs 1: Return to libc attack. The whole execution was done on Github codespaces although, I would suggest oracle VM for this. Let me know if it helps.
-
SEED-labs-2
SEED-labs-2 PublicThe SEED lbs 2 tasks execution. The lab shows successful execution of buffer overflow tasks.
-
SEED-LABS-3
SEED-LABS-3 PublicThe SEED lbs 3 tasks execution. The lab shows successful execution of Format String Vulnerability.
-
-
SEED-LABS-5
SEED-LABS-5 PublicHere is the implementation of SEED Labs 5: SQL Injection. The execution was done on Oracle VM. Refer to the SEED labs website for files or any other resources.
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.