@luvranjan143
B.Tech in CSE | Exploring AI,ML and Cybersecurity
馃憢 Hi there! I鈥檓 Hritik Ranjan, a passionate and dedicated B.Tech in Computer Science Engineering student specializing in AI, Machine Learning, and Cybersecurity. 馃専 I love building innovative solutions that leverage technology to solve real-world problems. My interests span various domains, including: Artificial Intelligence & Machine Learning: Exploring the latest algorithms and techniques to create intelligent systems. Cybersecurity: Focusing on vulnerability assessment and mitigation to ensure robust security for applications and systems. Web Development: Crafting interactive web applications using modern frameworks and libraries. Data Science: Analyzing and interpreting complex datasets to extract meaningful insights. 馃捈 I鈥檓 currently working on several exciting projects, including: Blindness Detection: Utilizing computer vision techniques to identify blindness-related conditions. Rail Madad Enhancement: Developing AI-powered complaint management systems for improved customer service in railways. Interactive Applications: From calculators to quiz games, I love creating user-friendly applications that enhance productivity and learning. 馃殌 Always eager to learn and grow, I actively participate in hackathons and collaborate with fellow enthusiasts to push the boundaries of technology. 馃敆 Feel free to connect with me! I'm always open to discussions, collaborations, or just a friendly chat about tech! 馃摣 You can reach me at hritikranjan1408@gmail.com
馃捈 Available for: Collaborations and opportunities in AI, Machine Learning, and Cybersecurity. Let's innovate together!
Mar 13, 2025 路 5 min read 路 Penetration Testing Walkthrough: Exploiting FTP and SSH Vulnerabilities Introduction In this blog, we will go through a complete penetration testing walkthrough, demonstrating how an attacker could exploit an FTP server with anonymous login enabled a...
Join discussion
Mar 10, 2025 路 13 min read 路 LHOST - Attacker IP (Listner host) LPORT - Attacker Port RHOST - Target IP(Remote host) RPORT - Target Port </aside> First find the IP address of metasploitable2 Machine(Target Machine) sudo netdiscover -r 192.168.1.0/24 sudo: Runs the command w...
Join discussion