Skip to content
View B3TA-BLOCKER's full-sized avatar
🌱
Evolving
🌱
Evolving

Highlights

  • Pro
Block or Report

Block or report B3TA-BLOCKER

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
B3TA-BLOCKER/README.md

GIF

Hi, My Name is Hassaan Ali Bukhari,

I am a student at one of Pakistan's leading Computer Science and Engineering University Ghulam Ishaq Khan Institute pursuing a bachelor's degree in Cyber Security. Proficient in C/C++, Python, and bash. I'm passionate about cybersecurity, development, and exploring different Operating Systems i.e. (Windows 10, Windows 11, and Linux). I use this platform to collaborate with like-minded individuals, share my learning materials for new skills, and showcase the projects I've developed.

You can reach me at:

📫 [email protected]

LinkedIn

My Development Environment and Operating System:


Databases I Have Worked On:


Languages I Have Worked With:


Frameworks I Have Worked On:


Statistics


Visitor Count

Visitor Count

Pinned Loading

  1. Bash-Playbook Bash-Playbook Public

    A collection of Bash scripts for learning and sharing scripting skills. Dive in, contribute, and enhance your Bash expertise!

    Shell 2

  2. GhostLogger GhostLogger Public

    GhostLogger is a hidden Windows keylogger that records keystrokes in Record.txt. For educational purposes !

    C++

  3. IP-Flooder IP-Flooder Public

    This repo contains a Bash script to perform SYN flood attacks on local network hosts using hping3 and ipcalc. Perfect for network testing and education.

    Shell 1

  4. SecurePass-Pro SecurePass-Pro Public

    This Bash script generates five random passwords of a specified length, using OpenSSL's random generator and base64 encoding. It includes error handling for invalid input and decorative ASCII art.

    Shell

  5. Security-Analysis Security-Analysis Public

    Discover insights into cyber security practices with our meticulously analyzed survey data.

    Jupyter Notebook 1 4

  6. Tic-Tac-Toe-Game Tic-Tac-Toe-Game Public

    This code is a simple Tic-Tac-Toe game where two players take turns entering numbers on a 3x3 grid. It checks for a winning condition and displays the winner.

    C++