Skip to content
View qwqoro's full-sized avatar
🚩
Captured the flag, I guess
🚩
Captured the flag, I guess

Block or report qwqoro

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
qwqoro/README.md

QWQORO

Hello! πŸ‘‹

🐼

 Pronouns          Languages

  • πŸ”“ Cyber Security Analysis Specialist
  • πŸ‰ Offensive Security Certified Professional  OSCP
  • βš™οΈ I take part in Web/Mobile Application Penetration Testing
  • βš”οΈ I participate in CTF events + solve labs
  • ⌨️ I hack, code & learn because I love it
Β 

Interests

 Cyber Security      Penetration Test    Malware Analysis    Computer Forensics
 Machine Learning    Web Development     Science             Law

Technologies

 OS: Windows           OS: Kali Linux        Code: Bash            Code: Python          Code: JavaScript      Code: React           Code: Express         Code: Flutter         Tool: Jupyter         Tool: Sublime Text    Tool: IntelliJ IDEA   Tool: WebStorm        Tool: Android Studio

[BurpSuite + extensions] [Metasploit] [Nmap] [Nikto] [Sqlmap] [Impacket] [Bloodhound] [Mimikatz] [Wireshark] [NetworkMiner] [volatility] [IDA Pro] [Immunity Debugger] [edb] ...


My Telegram channel: HaHacking

Telegram Β  Habr Β  VK Β  Spotify Β  Steam Β  HackTheBox Β  Mail Β  Matrix

Pinned Loading

  1. ML-Talk ML-Talk Public

    πŸ“„ [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools

    Jupyter Notebook 13 4

  2. Mail-Injection Mail-Injection Public

    πŸ“§ [Research] E-Mail Injection: Vulnerable applications

    HTML 12 1

  3. Android-Malware-Analysis Android-Malware-Analysis Public

    🐰 [HaHacking: Notes] Android Malware Analysis

    4 1

  4. GPN-Hackathon GPN-Hackathon Public archive

    πŸ›’ [Hackathon] Gazprom Neft Hackathon: Solution

    2

  5. ML-Corrupted ML-Corrupted Public archive

    πŸ“Š [ML] Classification Problem Solution: Guessing the type of a corrupted file

    Jupyter Notebook