Skip to content
View DefinetlyNotAI's full-sized avatar
🏠
Working from home
🏠
Working from home
Block or Report

Block or report DefinetlyNotAI

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
DefinetlyNotAI/README.md

trophy

About Me:

I'm a passionate penetration tester / Ethical Hacker with a knack for destruction red team hacking, specializing in network attacks and analysis and hacking tool creation. I thrive on testing and learning new hacking tools and exploiting vulnerabilities then fixing them. Additionally, I have a strong foundation in robotics and possess the requisite mathematical prowess I am a nerd.

Currently, I'm delving into the realms of metasploit as well as my own life's exam's, where I'm actively engaged in wasting time rather than studying by tool creation. During my leisure time, you'll find me honing my problem-solving skills on python and participating in robotics challenges.

Social media: πŸ“‘

Join me on email, where I share insights, victories, and even the occasional setback. Nirt_12023@outlook.com

Platforms: πŸ₯‡

LeetCode (No hate, I'm New...)

Languages and Tools

Languages:

Python3 PowerShell Arduino
Python PowerShell Arduino

Environments, Testing, Other:

nodejs Git Virtual Box
NodeJS Git Postman

OS:

Linux Windows Kali
Linux Ubuntu Linux

It's not technology, but I use it:

ssh xml yaml json vsc PC GitLab Confluence


snake

Thanks to sammorozov for the README idea.

Pinned

  1. Logicytics Logicytics Public

    A powerful tool designed to harvest and collect a wide range of windows system data for forensics.

    Python 3

  2. Obfuscated-Malware Obfuscated-Malware Public

    A sneaky EXE file that, when executed, runs two programs in sequence. This technique can be used for various purposes, including reverse engineering, social engineering, and online trickery.

    1

  3. Calcula-PC Calcula-PC Public archive

    Tiny Python Program of different programming calculators

    Python 1

  4. Simple_Logger Simple_Logger Public

    Tiny Python Program for a already existing keylogger software (All credit due Minhas Kamal) that is simply a menu setup to make it more practical

    HTML 1