Skip to content
View qwqoro's full-sized avatar
๐Ÿšฉ
Captured the flag, I guess
๐Ÿšฉ
Captured the flag, I guess

Block or report qwqoro

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
qwqoro/README.md

QWQORO

Hello! ๐Ÿ‘‹

๐Ÿผ

 Pronouns          Languages

  • ๐Ÿ”“ Cyber Security Analysis Specialist
  • ๐Ÿ‰ Offensive Security Certified Professional  OSCP
  • โš™๏ธ I take part in Web/Mobile Application Penetration Testing
  • โš”๏ธ I participate in CTF events + solve labs
  • โŒจ๏ธ I hack, code & learn because I love it
ย 

Interests

 Cyber Security      Penetration Test    Malware Analysis    Computer Forensics
 Machine Learning    Web Development     Science             Law

Technologies

 OS: Windows           OS: Kali Linux        Code: Bash            Code: Python          Code: JavaScript      Code: React           Code: Express         Code: Flutter         Tool: Jupyter         Tool: Sublime Text    Tool: IntelliJ IDEA   Tool: WebStorm        Tool: Android Studio

[BurpSuite + extensions] [Metasploit] [Nmap] [Nikto] [Sqlmap] [Impacket] [Bloodhound] [Mimikatz] [Wireshark] [NetworkMiner] [volatility] [IDA Pro] [Immunity Debugger] [edb] ...


My Telegram channel: HaHacking

Telegram ย  Habr ย  VK ย  Spotify ย  Steam ย  HackTheBox ย  Mail ย  Matrix

Pinned Loading

  1. ML-Talk ML-Talk Public

    ๐Ÿ“„ [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools

    Jupyter Notebook 12 4

  2. Mail-Injection Mail-Injection Public

    ๐Ÿ“ง [Research] E-Mail Injection: Vulnerable applications

    HTML 13 1

  3. Android-Malware-Analysis Android-Malware-Analysis Public

    ๐Ÿฐ [HaHacking: Notes] Android Malware Analysis

    3 1

  4. GPN-Hackathon GPN-Hackathon Public archive

    ๐Ÿ›ข [Hackathon] Gazprom Neft Hackathon: Solution

    2

  5. ML-Corrupted ML-Corrupted Public archive

    ๐Ÿ“Š [ML] Classification Problem Solution: Guessing the type of a corrupted file

    Jupyter Notebook