░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░ ░▒▓████████▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░ ░▒▓█▓▒░▒▓█▓▒░ ░▒▓█▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░ ░▒▓█▓▒░▒▓█▓▒░ ░▒▓█▓▒░
░▒▓███████▓▒░░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓██████▓▒░ ░▒▓█▓▒░▒▓█▓▒░ ░▒▓██████▓▒░
░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░ ░▒▓█▓▒░▒▓█▓▒░ ░▒▓█▓▒░
░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░ ░▒▓█▓▒░▒▓█▓▒░ ░▒▓█▓▒░
░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░░▒▓██████▓▒░░▒▓█▓▒░ ░▒▓█▓▒░▒▓████████▓▒░▒▓████████▓▒░
╭───────────────────────────────────────────╮
│ 🛡️ SKILL MATRIX │
╰───────────────────────────────────────────╯
┌───────────────┐ ┌───────────────┐
│ CYBER SKILLS │ │ CODE ARSENAL │
├───────────────┤ ├───────────────┤
│ Pen Testing │ │ Backend │
│ Threat Hunting│ │ Systems Prog │
│ Vuln Analysis │ │ Secure Design │
│ Network Sec │ │ Cloud Native │
└───────────────┘ └───────────────┘
╭──────────────────────────╮
│ MISSION: SECURE & CREATE │
╰──────────────────────────╯
4B10 3EBD 5F18 FC8D 48C1 5440 60C9 E6BF AF19 527C
- Abuja, Nigeria
-
17:14
(UTC +01:00) - linktr.ee/k0ns0l
- in/k0ns0l
Highlights
Popular repositories Loading
-
-
writeup-Exploit.Education
writeup-Exploit.Education PublicContains solutions to different levels & categories of exploit.education series -
Python 3
-
-
Betty
Betty PublicForked from alx-tools/Betty
Holberton-style C code checker written in Perl
Perl 1
-
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.