Ephemeral Messaging Service: The platform functions as a "self-destructing" note service, allowing users to create temporary messages that do not persist permanently.
"Read-Once" Security: True to the name "Ghostnote," messages are designed to vanish after they are viewed, ensuring that sensitive information cannot be accessed a second time.
Secure & Private Sharing: It serves as a privacy-focused tool for sharing secrets (such as passwords, API keys, or confidential instructions) without leaving a digital footprint in chat logs or email history.
Zero-Knowledge Architecture: The service typically operates without requiring user accounts or data retention, prioritizing anonymity and data hygiene by purging content immediately after consumption.
Minimalist Utility: Like its sister sites, it features a stark, distraction-free interface focused entirely on the single task of generating and retrieving secure, temporary links.
Collaborative Storytelling Platform: The site is designed as a creative hub where users can build narratives together, contributing to stories "one line at a time" rather than writing in isolation.
Interactive "Factory" Model: It Gamifies the writing process by featuring active stories that users can join and contribute to, with a competitive element where the "best story gets featured."
Life-Cycle Management: Stories have a defined lifecycle; once a story is "Locked," it is converted into a static blog post and archived after 7 days, preserving the finished collaborative work.
User-Centric Community: The platform requires user authentication (Login/Sign Up) to contribute, fostering a verified community of writers (currently showing active users online).
Simple & Direct Interface: It offers a clean, straightforward UI with distinct sections for "Active Stories," "Locked Stories," and a simple prompt to "Start a New Story," minimizing distractions to focus on writing.
Private & Read-Only Architecture: The service is explicitly designed as a private hosting solution. Unlike public pastebins, it operates in a read-only mode for visitors, preventing unauthorized users from creating new entries.
Built-in Encryption Support: The platform includes security features to password-protect specific pastes, ensuring that sensitive code or information remains inaccessible to users without the correct decryption credentials.
Minimalist Utility: It offers a distraction-free, bare-bones interface focused entirely on rendering text and code snippets, stripping away social features, ads, or complex navigation.
Secure Information Sharing: By combining private access with encryption, it serves as a secure method for hosting configuration files, welcome notes, or sensitive documentation intended for a specific audience.
Comprehensive Digital Toolbox: The site functions as a versatile "Swiss Army knife" for the web, aggregating a vast collection of browser-based utilities into a single, centralized dashboard.
Diverse Functionality: It hosts tools across a wide range of categories including Development (Cron Assistant, HTML Sandbox), Design (Image to GLB converter, Color Detector), Productivity (ToDo Reminders, Decision Maker), and Security (Encryption tools, Password generators).
Cybersecurity & Intelligence Hub: A significant portion of the site is dedicated to security professionals, offering direct access to threat maps, IP reputation checkers (AbuseIPDB), and intelligence platforms like VirusTotal and Shodan.
AI & Creative Resources: The platform integrates AI-driven utilities such as image classifiers and OCR (Optical Character Recognition) tools, while also serving as a portal to major external AI services like ChatGPT and Gemini.
Everyday Practicality: It solves common digital problems with instant-access tools for tasks like file conversion (Data2PDF, Image Converter), text manipulation (Diff Master), and system monitoring (Internet Speed Checker, Web Monitor).
Description: A lightweight, dependency-free JavaScript library for creating complex, trigger-based web animations directly within HTML.
Core Technologies: Built with modern JavaScript (ES6+), leveraging the high-performance Web Animations API and the efficient Intersection Observer API.
Key Feature: Driven by a declarative data-animasis attribute, enabling animations on hover, click, and scroll triggers with no JavaScript required for most use cases.
License: Creative Commons Attribution 4.0 (CC BY 4.0), which requires users to provide credit to the creator to use the library.
Description: Working on a constantly evolving security home lab setup to have hands-on practice on different security architectures, attacks, and mitigation processes. Consists of self-hosted docker instances and virtual machines with vulnerable and attack images. Hosted enterprise-grade secure infrastructure and domain management systems using Google Admin and Microsoft Active Directory with Group Policy & Registry Creation and Management.
Technologies: Docker, Virtual Machines, Cloud Infrastructures - Google Cloud, Azure AD, and AWS.
OS: MacOS, Windows, Linux, Android, iOS
Role: Network Configuration, and Administration, Migrating and managing between On-premises and Cloud Infrastructures.
Anna Daan Wastage Management System (Community Service Project)
Description: Developed a comprehensive website facilitating the distribution of excess food to those in need from various events. Implemented a blogging platform to foster community discussions and engagement.
Eye Movement Pattern Based Authentication System (EPAS)
Description: Developed a Continuous Authentication Model utilizing gaze pattern monitoring as a Personal Identification Number (PIN), achieving a 95% accuracy in user identification and reducing unauthorized access incidents by 30%
Intrusion Detection System using Layered Machine Learning Algorithm
Description: Implemented an Intrusion Detection System (IDS) with enhanced detection capabilities, increasing threat detection accuracy by 20% and reducing false positives by 15%
Description: The tool can fetch versions of node packages from remote GitHub repositories (both private and public repositories) and then check if they match with the user-inserted package version. In case the existing packages are of an older version, they can be automatically updated by the -update argument when inserted in the command line by the user, following which a PR will be created for the Node Version Update.