Skip to content
View mturhanlar's full-sized avatar
🤓
🤓

Highlights

  • Pro

Block or report mturhanlar

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mturhanlar/README.md

Typing SVG

About me👋

  • 💼 I’m Red Teamer, mostly focused on Offensive Security side, lifetime learner. I'm holding GRTP, OSCP, CRTO also had LFCS, LFCE, CEH.
  • 🔭 I’m currently working on sharpen my pentesting skills, and tweak my Red Teaming skills
  • 🌱 I’m currently learning/improving my skills at Malware Development, k8s, Container Security, CI/CD security, Cloud Pentesting/Red Teaming.
  • 😄 Pronouns: he/him/his
  • ⚓ My Blog to be more orginized: turme.gitbook.io

How to Reach Me?

LinkedIn Website

Tech Stack

                 

Popular repositories Loading

  1. turme turme Public

    This is a repository for Penetration Test, Purple Team Exercise and Red Team

    17 1

  2. metasploit_dev metasploit_dev Public

    Notes for Devoloping Metasploit modules

  3. metasploit-framework metasploit-framework Public

    Forked from rapid7/metasploit-framework

    Metasploit Framework

    Ruby

  4. Detecting_Turkish_Phishing_Attack_with_Machine_Learning_Classifier Detecting_Turkish_Phishing_Attack_with_Machine_Learning_Classifier Public

    This is a repo prepared to inspire academic studies.

    Jupyter Notebook

  5. dprcn dprcn Public

    Forked from hatecomputers/dprcn

    dpcrn aka dope recon is a module oriented recon tool.

    Python

  6. System-related System-related Public

    System related scripts will be collected here.

    Shell