Skip to content
View sudoblanc's full-sized avatar
💻
Learning
💻
Learning

Block or report sudoblanc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
sudoblanc/README.md

Hi there 👋

Hello Internet, Information Security learner here. What drives me to be here? Most of the results out of my curiosity and efforts to learn has been on backend and undocumented. I believe these curiosity could be shared among passionate individuals .

- 🔭 I’m currently working on

  1. Log analysis automation using perl.
  2. Shell Scripting to automate Cisco Catalyst Switches Configs.
  3. Getting AWS Cloud Practioner Certificate
  4. Home Lab setup(soon)

- 🌱 I’m currently learning

  • AWS Infrastructure
  • Scripting

Skills

- 📫 How to reach me: Twitter | Linked In

Pinned Loading

  1. Exploiting-Windows-XP-In-a-close-lab-environment Exploiting-Windows-XP-In-a-close-lab-environment Public

    This project aims to learn different types of vulnerability that exists in windows environment as a way to deepen understanding of how could a system vulnerabilities be exploited.

    2

  2. Web-Security-Server-Side-Vulnerabilities- Web-Security-Server-Side-Vulnerabilities- Public

    This are my walkthrough and writeups for Server side vulnerabilities learning path from https://portswigger.net/web-security These walkthrough represent my understanding failure and analysis of con…

  3. Cisco-Switch-Automation Cisco-Switch-Automation Public

    Developed a simple script to automate wiping of CISCO Catalyst 3850 and supportive IOS version for other Cisco models

    PowerShell