Skip to content
View 53845714nF's full-sized avatar
🧠
🧠
Block or Report

Block or report 53845714nF

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
53845714nF/Readme.md

Typing SVG

About me

I'm a passionate open source enthusiast and am interested in making systems, networks and programs secure. And to check them for their security. My goal is to always develop and improve myself πŸ§ πŸ‹οΈ.

  • πŸ”­ I'm currently studying Computer Science at the University of Applied Sciences Brandenburg.
  • 🌱 At the moment I'm constantly looking for technical challenges.
  • πŸ‘― Meet with friends in the Chaostreff Potsdam πŸš€ and in the Brandenburger Linux User Group 🐧.
  • ⚑ Fun fact: I love swimming πŸŠβ€β™‚οΈ.
  • πŸ“š My Blog: Hackwiki

πŸ”¨ Practical knowledge

ClickπŸ‘†
Property Data
Programming languages

arduino bash python C C++ golandg Flask

Web Technologies

Hugo Bootstrap React React

FastAPI Flask Symfony

FastAPI Flask Flask

Selenium Postman

Databases

Influx DB MySQL Postgre SQLite Weaviate

DevOps

git Github Github GitLab

Docker Docker-Compose LCX Proxmox VE

Packer Salt Terraform

Jira Kanboard

Grafana Zabbix

git git

Security Tools

Greenbone Security Manager Metasploit Nmap Volatility Wireshark

Text Editors Vim VSCode

Markup language

LaTex Markdown

πŸ“ˆ Github statistics

ClickπŸ‘†

Pinned

  1. vuln2pve vuln2pve Public

    vuln2pve is a Shell Script, it download VM's from Vulnhub and convert this to the Proxmox VE format. Can be used by CTF (Capture the Flag) players who prefer the open source platform Proxmox.

    Shell 2

  2. Reverse_Engineering_KVM_Switch Reverse_Engineering_KVM_Switch Public

    A document of the Reverse Engineering KVM Switch Signal. This was part of the third semester Computer Science in the subject Operating Systems and Computer Networks.

    TeX 1

  3. hasura-jwt hasura-jwt Public

    This service allows you to create JWTs for hasura-graphql-engine. And can have a signup process via email.

    Go

  4. packer-proxmox-debian packer-proxmox-debian Public

    This project provides Packer files to build a basic image of Debian with Salt Minion for use on a Proxmox system. Use it as is or as a starting point for a more fully customized image.

    HCL

  5. Fast exploit for the rhme2 CTF. For ... Fast exploit for the rhme2 CTF. For the challenge Photo Manager. Written in Python3. Breaks a a stack cookie.
    1
    #!/usr/bin/env python3
    2
    import serial
    3
    import time
    4
    
                  
    5
    try:
  6. OWON_B35T OWON_B35T Public

    Just a small tool to show the values from the OWON B35T+ Multimeter.

    Python