GithubHelp home page GithubHelp logo

Hi there, thank you for stopping by šŸ‘‹

I'm a software developer and cyber security enthusiast. Python, is my main development tool for both security and web applications. I'm very passionate about cyber security, I spend much of my spare time learning and obsessing about the latest hacks, for web, cryptography, pwn. I spend most of my time learning and obsessing about new and existing security issues.


šŸ“« šŸ¤ Connect and Reach out to me: šŸ‘‡

# Skills:

  • Cyber Security:

    • Web App Penetration Testing.
    • Network Penetration Testing.
    • CTF Player.
    • Tools: Burpsuite, Nmap, Nessus, OpenVAS, wireshark, gobuster, aircrack-ng, metasploit, impacket...
  • šŸ”­ Iā€™m currently working on Client projects.

  • šŸŒ± I'm currently learning Privilege escalation and malware.

  • šŸ’¬ Ask me about Cybersecurity.

And by the way, There are many ways of killing a rat!

Top Languages and Tools:

Visual Studio Code

HTML5

CSS3

Sass

JavaScript

Django

Python

C++

Linux

MySQL Git GitHub

:octocat: My stats


TryHackMe

D_C4ptain's Projects

campusman icon campusman

A collaboration for a campus (school) management system.

decrypt-md5-hash icon decrypt-md5-hash

A simple python script that goes through a wordlist to decrypt an MD5 hash.

first-pull-request icon first-pull-request

Here we are going to practice pull request by adding our name plus GitHub link to the readme file

keylogger icon keylogger

One of the oldest forms of cyber threat, keyloggers record keystrokes typed in the keyboard and send them to a third party.

kiterioc icon kiterioc

A multiplatform IOC hunter for Cyber Threat Intelligence

peh-tcm icon peh-tcm

Compilation of resources and notes from TCM's Practical Ethical Hacking Course

portservicename icon portservicename

This is just a simple python script to identify some of the common ports you may come across during enumeration or in daily network activities.

privilege-escalation icon privilege-escalation

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

radareeye icon radareeye

Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.

steganography icon steganography

Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB extraction) for bitmap images.

the_shield icon the_shield

You can find the shield website here https://th3-shield.github.io/the_shield/ OR

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    šŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. šŸ“ŠšŸ“ˆšŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ā¤ļø Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.