GithubHelp home page GithubHelp logo

👨‍💻 @sharpleynate

Cybersecurity Undergrad

Find me on TikTok for the latest in cybersecurity news. "ai.mentality"

youtube subscribers youtube views followers total stars


🧰 Languages and Tools

Git

Linux

Python

GitHub

Bash


📺 Latest YouTube Videos

CompTIA CySA+ | Study Session | Ep. 04 CompTIA CySA+ | EP. 03 | Study Session | No Sound CompTIA CySA+ | EP. 02 | Study Session | No Sound CompTIA CySA+ | EP. 01 | Study Session | No Sound Python | No Sound | EP. 01 CompTIA A+ | Study Session | Ep. 6

📊 Stats

Nate's GitHub stats

Nathaniel Sharpley's Projects

a-collection-of-awesome-penetration-testing-resources icon a-collection-of-awesome-penetration-testing-resources

A curated list of tools and frameworks for ethical hacking. It covers vulnerability scanners, exploit development, password cracking, and more to help hackers of all levels stay updated with the latest techniques and best practices.

anti-adblock-killer icon anti-adblock-killer

Anti-Adblock Killer helps you keep your Ad-Blocker active, when you visit a website and it asks you to disable.

bot icon bot

The community bot for the Python Discord community

cloud-resume-challenge icon cloud-resume-challenge

A serverless resume website with view counter using AWS. This is a public copy of the private repo.

cloudgoat icon cloudgoat

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool

cybersecurity icon cybersecurity

Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.

cybersecurity-application-security icon cybersecurity-application-security

An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best guidelines and technical resources about Application Security

cybersecurity-devsecops icon cybersecurity-devsecops

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about DevSecOps in Cybersecurity.

cybersecurity-penetration-testing icon cybersecurity-penetration-testing

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Penetration Testing in Cybersecurity.

cybersecurity-red-team icon cybersecurity-red-team

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.

cybersecurity-threat-intelligence icon cybersecurity-threat-intelligence

An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.

discord-bage icon discord-bage

Pretty simple Discord bot to get the active developer badge

gpt-discord-bot icon gpt-discord-bot

Example Discord bot written in Python that uses the completions API to have conversations with the `text-davinci-003` model, and the moderations API to filter the messages.

gpt-engineer icon gpt-engineer

Specify what you want it to build, the AI asks for clarification, and then builds it.

hacker-roadmap icon hacker-roadmap

A collection of hacking tools, resources and references to practice ethical hacking.

hashverify icon hashverify

Created 'HashVerify,' a Python program that calculates SHA-256 hash values for files and verifies their integrity. By comparing calculated and original hash values, it detects any tampering or modifications. Utilizes the hashlib library and basic file I/O operations to ensure file security.

kill-chain-mitre-attack-atomic-red-team icon kill-chain-mitre-attack-atomic-red-team

Exploring Red Team techniques, leveraging PowerShell and Splunk integration for comprehensive cybersecurity testing. Tasks included script execution setup, Atomic Red Team installation, and telemetry analysis.

password-strength-checker-with-brute-force-attack-estimation icon password-strength-checker-with-brute-force-attack-estimation

Developed a Python-based 'Password Strength Checker' that estimates the strength of passwords and calculates the time it would take for a brute-force attack to crack them. This project utilized a password strength library and a password cracking algorithm to provide users with an accurate estimate of their password security.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.