Cybersecurity & Blade Runner fan excalibra@proton.me
Awarded for writing and sharing your first DEV post! Continue sharing your work to earn the 4 Week Writing Streak Badge.
ChiseiKoya
Waseda University, University of Tokyo, Academia Sinica (Taiwan), as well as key universities and research institutions in China, with repositories of academic papers in social sciences, economics, mathematics, game theory, philosophy, systems engineering, and related fields.
2 stars
cybersecurity
A structured repository designed for cybersecurity professionals and enthusiasts. Covers topics such as OSINT, NMAP, WAPT, PTES, IDS/IPS, SIEM, malware analysis, privilege escalation, and more. Ideal for mastering ethical hacking, penetration testing, and advanced security techniques.
Jupyter Notebook • 2 stars
network-tunneling
📖 Detailed Explanation of Network Proxies and VPN Applications provides an in-depth analysis of the operations of proxies, tunnels, and VPNs, and explains the principles behind GFW strategies such as address and port blocking, server cache poisoning, digital verification attacks, and SSL connection disruptions.
Shell • 2 stars
scripts
Platform: Windows/Mac/Linux. Scripting: Various, no restrictions; customized as needed. Tasks: Desktop checks, software cracking, AV evasion, privilege execution, firmware read/write, password checks, Wi-Fi scans, cloud security, log analysis, NLP, and data analysis in humanities/social sciences.
We're a place where coders share, stay up-to-date and grow their careers.