Skip to content
View yatna's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Organizations

@systers

Block or report yatna

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Serialize-Deserialize-Directories Serialize-Deserialize-Directories Public

    A C based command line utility to serialize a tree of files and directories to a sequence of bytes and to deserialize such a sequence of bytes to re-create the original tree. Such a utility could b…

    C

  2. Bourse-Exchange-Server Bourse-Exchange-Server Public

    A simple implementation of an exchange server, of the type that might be used to perform electronic trading of securities or currencies. In this simple design, the server is accessed concurrently b…

    C 1

  3. Custom-Linux-Shell Custom-Linux-Shell Public

    A job spooler program, called `jobber`, that accepts user requests to spool tasks for execution, cancel jobs, pause and resume jobs, show the status of jobs, and expunge terminated jobs from the sy…

    C

  4. Binary-Instrumentation-using-Pintool Binary-Instrumentation-using-Pintool Public

    Developed pintools in C++ to print system calls in strace format for multithreaded applications. Implemented a pintool to find the maximum stack usage in a program and detect stack pivoting.

    C++

  5. Covid19-Analysis-MapReduce Covid19-Analysis-MapReduce Public

    Covid-19 dataset analysis on pseudo-distributed Hadoop and Spark

    Java 1

  6. Exploiting-Vulnerable-Code Exploiting-Vulnerable-Code Public

    Exploit a vulnerable program and launched stack overflow attack, return-to-libc attack, injected code attack. Implement a format string attack to inject attacker code. Exploit a heap overflow vulne…

    C 1