Code Monkey home page Code Monkey logo
         $               ██▀███  ▓█████ ▓█████ ▓█████▄     ██▓    ▓█████  ▒█████   ███▄    █ ▓█████  ██▓ ██▓        
   *1▒g▒#▒$▒▒1▒,Q       ▓██ ▒ ██▒▓█   ▀ ▓█   ▀ ▒██▀ ██▌   ▓██▒    ▓█   ▀ ▒██▒  ██▒ ██ ▀█   █ ▓█   ▀ ▓██▒▓██▒    
  ▒▒▒▒▒▒▒▒▓▒▒▒▒▒        ▓██ ░▄█ ▒▒███   ▒███   ░██   █▌   ▒██░    ▒███   ▒██░  ██▒▓██  ▀█ ██▒▒███   ▒██▒▒██░    
 #/▒▒▒▒▓▒▒▒▓▒▒▓▒g       ▒██▀▀█▄  ▒▓█  ▄ ▒▓█  ▄ ░▓█▄   ▌   ▒██░    ▒▓█  ▄ ▒██   ██░▓██▒  ▐▌██▒▒▓█  ▄ ░██░▒██░    
 1▒▒▒▒▒R▒▒▒▓▓▓▒▒▒▒▓\    ░██▓ ▒██▒░▒████▒░▒████▒░▒████▓    ░██████▒░▒████▒░ ████▓▒░▒██░   ▓██░░▒████▒░██░░██████▒
 /@ $@@,0▒▒1▒|7$e$,     ░ ▒▓ ░▒▓░░░ ▒░ ░░░ ▒░ ░ ▒▒▓  ▒    ░ ▒░▓  ░░░ ▒░ ░░ ▒░▒░▒░ ░ ▒░   ▒ ▒ ░░ ▒░ ░░▓  ░ ▒░▓  ░
       4j7▒4!             ░▒ ░ ▒░ ░ ░  ░ ░ ░  ░ ░ ▒  ▒    ░ ░ ▒  ░ ░ ░  ░  ░ ▒ ▒░ ░ ░░   ░ ▒░ ░ ░  ░ ▒ ░░ ░ ▒  ░
|       #7Y*       \      ░░   ░    ░      ░    ░ ░  ░      ░ ░      ░   ░ ░ ░ ▒     ░   ░ ░    ░    ▒ ░  ░ ░   
4▒    #▒4▒▓9      4        ░        ░  ░   ░  ░   ░           ░  ░   ░  ░    ░ ░           ░    ░  ░ ░      ░  ░
$▒9g e@▒▒!4▒▒$-  #e                             ░                                                               
|▒▒▒▒▒#|   |e▓▒▒▓$e                             💻  I'm interested in IoT and Hacking
 Yeg▒▓\,   $9▒▒▒e÷4                             🌱  I'm currently learning Go
 gp@l▒▒,▒▒Y@▒▒M7 7                              🔗  Connect with me on LinkedIn
 , ▒▒@1▒▒▒▓9÷▒▒4Q                               🌐  reedleoneil.github.io
    "▓  /Q▒-▒▒7,0$    
 !     ▒▒                                       
 \▒\▒         ▒440    
 1▒\▒    *▒0    ▒     
  1▓9▒▒▓# ▒*▓   ÷     
    e▒▒▒▓▒▒  ▓▒▒▒     
       g                                      

Projects

reedleoneil's Projects

burat-1.0 icon burat-1.0

Remote Administration Tool developed in 2014.

csharp-cx-lib icon csharp-cx-lib

C# Coins Pro API Library Philippines' first digital currency exchange.

evail icon evail

This is a quick exercise to illustrate how evil is eval(). eval() is a dangerous function, which executes the code it's passed with the privileges of the caller. If you run eval() with a string that could be affected by a malicious party, you may end up running malicious code on the user's machine with the permissions of your webpage / extension.

gekko icon gekko

A bitcoin trading bot written in node - https://gekko.wizb.it/

js-cx-lib icon js-cx-lib

Javascript CoinsPro API Library Philippines' first digital currency exchange.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.