Skip to content
View Mdot0's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Mdot0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Pentesting-Methodology Pentesting-Methodology Public

    When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF.

    23 6

  2. Cloud-Anomaly-Detection-Platform- Cloud-Anomaly-Detection-Platform- Public

    A cloud-based security analytics platform that ingests process creation logs, applies machine learning-based anomaly detection, and provides a web dashboard with AI-assisted investigation tools. Bu…

    Python 1

  3. Access-Control-Compliance-Dashboard Access-Control-Compliance-Dashboard Public

    TypeScript 1

  4. Writeups Writeups Public

    CTF Writeups

    1

  5. SharpCollection SharpCollection Public

    Forked from Flangvik/SharpCollection

    Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.

    1

  6. Security-Notes Security-Notes Public