Skip to main content

Posts

Showing posts from 2025

5Min Intraday Stock Historical Data For Download — 2015 to Aug 2025 Download

Are you a trader, analyst, or data enthusiast looking for reliable historical stock market data for India? Look no further! I am offering a  comprehensive dataset  covering  Indian stock data from 2015 to August 2025 . This dataset is perfect for  backtesting trading strategies, algorithmic trading, research, or learning  the Indian stock market trends. What’s included: Stock Database (.db) — stock_database_.db_File_2015_Aug_2025_5min.rar SQL database format Contains 5-minute interval data for all major Indian stocks Easily queryable for automated backtesting or analysis Stock Data in Excel (.xlsx) — Stock_Data_Excel_5min.rar Excel spreadsheets for easy access Ideal for manual analysis or visualization Includes OHLCV data (Open, High, Low, Close, Volume) Why this dataset is valuable: 10+ years of high-resolution historical data — perfect for analyzing long-term trends Ready-to-use formats — database for coders, Excel for analysts Affordable price — get all this ...

Auto_DLL_Hijack_Suite_GUI

  This project provides a suite of two Python-based GUI tools designed to automate and streamline the process of discovering and testing potential DLL hijacking vulnerabilities in Windows applications. Overview This project provides a suite of two Python-based GUI tools designed to automate and streamline the process of discovering and testing potential DLL hijacking vulnerabilities in Windows applications. It leverages Sysinternals Process Monitor (Procmon) for data collection and provides a framework for testing identified hijack points with user-selected payloads. Many applications attempt to load Dynamic Link Libraries (DLLs) without specifying a full path. If these DLLs are not found in standard locations, an attacker might be able to place a malicious DLL with the same name in a location that the application searches earlier (e.g., the application’s own directory if it has weak permissions), leading to the malicious DLL being loaded and executed. Manually identifying all such...