Code Monkey home page Code Monkey logo
djwt photo

testcomputer Goto Github PK

followers: 19.0 following: 198.0 repos: 65.0 gists: 1.0

Name: djwt

Type: User

Company: djwt.dev

Bio: --๐Ÿƒ -------๐ง๐ญ๐ฐ๐ซ๐ค|๐ฌ๐ฉ๐œ๐ฅ๐ฌ๐ญ ------โ™–------ technologist crafting connectivity, optimizing performance, and driving innovation. @gitlab| Open Sorcerer

Location: 30.266666, -97.733330 | 512

Remember, security is a multi-layered approach. It's not just about securing the server configuration, but also about ensuring secure coding practices, maintaining the server, monitoring for intrusions, having a response plan, and keeping everything updated. Always stay informed about the latest security best practices and vulnerabilities related to your stack.

image

๐‡๐ž๐ฅ๐ฅ๐จ ๐ญ๐ก๐ž๐ซ๐ž, ๐Ÿ๐ž๐ฅ๐ฅ๐จ๐ฐ {๐šŒ๐š˜๐š๐šŽ๐š›๐šœ} ๐™ถ๐š›๐šŽ๐šŽ๐š๐š’๐š—๐š๐šœ!

  • ๐Ÿ”ญ ๐š—๐šŽ๐š๐š ๐š˜๐š›๐š” ๐šœ๐šŽ๐šŒ๐šž๐š›๐š’๐š๐šข_

๐Ÿงฎ ๐šœ๐š๐šž๐š๐šข๐š’๐š—๐š ๐š’๐š—๐š๐š˜-๐šœ๐šŽ๐šŒ ๐šŠ๐š ๊œฑแด€ษด๊œฑ

  • ๐ŸŒฑ ๐š๐šŽ๐šŒ๐š‘๐š—๐š’๐šŒ๐šŠ๐š• ๐šŒ๐š˜๐š—๐š๐šŽ๐š—๐š ๐š ๐š›๐š’๐š๐š’๐š—๐š & ๐šŸ๐š’๐š›๐š๐šž๐šŠ๐š• ๐š—๐šŽ๐š๐š ๐š˜๐š›๐š” ๐š๐šŽ๐šœ๐š’๐š๐š—

  • ๐Ÿ›ฉ๏ธ ๐šŒ๐šž๐š›๐š›๐šŽ๐š—๐š๐š•๐šข ๐š‹๐šž๐š’๐š•๐š๐š’๐š—๐š ๐š๐š“๐š ๐š.๐š๐šŽ๐šŸ & testcomputer.github.io ๐ฌ๐ญ๐š๐ฒ ๐ญ๐ฎ๐ง๐ž๐ ๐Ÿ๐จ๐ซ ๐ฎ๐ฉ๐๐š๐ญ๐ž๐ฌ!

  • โšก ๐š™๐šŠ๐šœ๐šœ๐š’๐š˜๐š—๐šŠ๐š๐šŽ ๐šŠ๐š‹๐š˜๐šž๐š ๐šŽ๐š–๐šŽ๐š›๐š๐š’๐š—๐š ๐šŽ๐š•๐šŽ๐šŒ๐š๐š›๐š’๐šŒ ๐šŠ๐šž๐š๐š˜๐š–๐š˜๐š๐š’๐šŸ๐šŽ ๐š๐šŽ๐šŒ๐š‘๐š—๐š˜๐š•๐š˜๐š๐šข!

  • ๐Ÿ“ฌ: ๐™ท๐š˜๐š  ๐š๐š˜ ๐š›๐šŽ๐šŠ๐šŒ๐š‘ ๐š–๐šŽ:

My GitHub Stats

๐Ÿ“Š Language Stats
testcomputer's mostly used Languages

Languages & Tools I use:

azure bootstrap css3 Metasploit AD AD nmap sql bootstrap python Google Cloud git git html5 linux bash

Network Security Projects

Welcome to my digital fortress of network security. Here, I explore the world of cybersecurity, balancing attack and defense strategies. This space is a collection of projects focusing on network vulnerabilities and how to counter them. I work mainly with Lua, Ruby, & Python in a Linux setting. Every project contributes to our understanding of cybersecurity, providing practical solutions. I encourage fellow enthusiasts and collaborators to join in this journey of discovery and innovation in network security. Inside, you'll find each project rich with valuable insights and tools.

๏ผฃ๏ฝ•๏ฝ’๏ฝ’๏ฝ…๏ฝŽ๏ฝ” ๏ผฐ๏ฝ’๏ฝ๏ฝŠ๏ฝ…๏ฝƒ๏ฝ”๏ฝ“๏ผš

๐™ท๐šŠ๐šŒ๐š”๐šƒ๐š‘๐šŽ๐™ฑ๐š˜๐šก
๐™ผ๐šŽ๐š๐šŠ๐šœ๐š™๐š•๐š˜๐š’๐š | ๐™ผ๐šŠ๐š•๐š ๐šŠ๐š›๐šŽ ๐™ฐ๐š—๐šŠ๐š•๐šข๐šœ๐š’๐šœ | ๐šƒ๐š‘๐š›๐šŽ๐šŠ๐š ๐™ท๐šž๐š—๐š๐š’๐š—๐š | ๐™ฑ๐šž๐š›๐š™ ๐š‚๐šž๐š’๐š๐šŽ | ๐™ฝ๐š–๐šŠ๐š™

๐šƒ๐š›๐šข๐™ท๐šŠ๐šŒ๐š”๐™ผ๐šŽ
๐™ป๐š’๐š—๐šž๐šก | ๐™ฝ๐šŽ๐š๐š ๐š˜๐š›๐š” ๐™ด๐šก๐š™๐š•๐š˜๐š’๐š๐šŠ๐š๐š’๐š˜๐š— | ๐™ฟ๐š›๐š’๐šŸ๐š’๐š•๐šŽ๐š๐šŽ ๐™ด๐šœ๐šŒ๐šŠ๐š•๐šŠ๐š๐š’๐š˜๐š— | ๐™ฟ๐š˜๐š ๐šŽ๐š›๐š‚๐š‘๐šŽ๐š•๐š•

๐™ป๐šŽ๐š๐šœ๐™ณ๐šŽ๐š๐šŽ๐š—๐š
๐™ป๐š˜๐š ๐™ฐ๐š—๐šŠ๐š•๐šข๐šœ๐š’๐šœ | ๐™ด๐š—๐š๐š™๐š˜๐š’๐š—๐š ๐™ฟ๐š›๐š˜๐š๐šŽ๐šŒ๐š๐š’๐š˜๐š— | ๐šƒ๐š‘๐š›๐šŽ๐šŠ๐š ๐™ธ๐š—๐š๐šŽ๐š• | ๐™ธ๐š—๐šŒ๐š’๐š๐šŽ๐š—๐š ๐š๐šŽ๐šœ๐š™๐š˜๐š—๐šœ๐šŽ | ๐š…๐šž๐š•๐š—๐šŽ๐š›๐šŠ๐š‹๐š’๐š•๐š’๐š๐šข ๐™ผ๐šŠ๐š—๐šŠ๐š๐šŽ๐š–๐šŽ๐š—๐š

๐šœ๐šŽ๐šŒ๐šž๐š›๐š’๐š๐šข ๐š๐š˜๐š™๐š’๐šŒ๐šœ
  Project: Network Analysis with Wireshark
  Project: Building a Honeypot to Lure Cyber Intruders
  Project: Firewall Rule Optimization for Maximum Security
  Project: Exploiting Cross-Site Scripting Vulnerabilities
  Project: Bypassing Network Access Control Systems
  Project: Secure Configuration of Network Routers and Switches
  Project: Host-based Intrusion Detection System (HIDS) Setup
  Project: Cloud Security Configuration and Best Practices
  Project: Vulnerability Scanning and Patch Management
  Project: Secure VPN Setup and Configuration
  Project: Continuous Security Monitoring with SIEM Solutions

Professional Summary
Seasoned Linux systems administrator with over 7 years of experience managing computer networks and optimizing system efficiency. Skilled in installing, configuring, and maintaining Linux servers to ensure high availability and reliability. Adept at network diagnostics, troubleshooting, and resolution to maximize uptime. Proficient in agile and Six Sigma methodologies for efficient project management. Experienced with various operating systems including Red Hat, Ubuntu, Debian, and CentOS. Leverages strong technical expertise in system administration to elevate network performance and accessibility. Collaborates cross-functionally to continuously improve infrastructure, operations, and security. Passionate about driving organizational success through optimized networks and systems. Eager to join a dynamic team where I can contribute my skills in system optimization, and project management.

Bicep Builders: Azure Sentinel and policy as code from Jesse Loudon and Casey Mullineaux
Sep 17, 2021
June 2021 Meetup: Azure Policy as Code: Zero to Hero in 60 minutes
Jun 23, 2021
Flexing Your Security Governance with Azure Policy As Code
Nov 10, 2021
Increasing Your Compliance with Microsoft Defender
Feb 3, 2022
Sydney DevOps Meetup โ€” August 2021
Aug 20, 2021

Effective security is a multi-layered strategy, far more than just server configuration. It begins with secure coding practices, which are fundamental in preventing vulnerabilities at the source code level. Regular maintenance of the server is crucial to ensure that it remains robust against emerging threats. Equally important is proactive monitoring for any signs of intrusion, enabling timely detection and response to potential security breaches.

Having a well-defined incident response plan is essential. This plan should include clear procedures for addressing security incidents, ensuring minimal impact and swift recovery. Regular updates are a cornerstone of security; staying current with patches and updates for your software stack is non-negotiable in safeguarding against known vulnerabilities.

Beyond these practical measures, continuous education and awareness are key. Keeping abreast of the latest security best practices, as well as being informed about new vulnerabilities specific to your technology stack, is critical in adapting and fortifying your security posture against an ever-evolving threat landscape. Remember, security is not a one-time task but a continuous process of improvement and adaptation.

Having a clear plan for dealing with security problems is a must.

djwt's Projects

azure-ps-cmds icon azure-ps-cmds

As an Azure administrator, I often use PowerShell scripts to automate tasks and manage resources on Azure. This GitHub repository contains a collection of my PowerShell scripts that I have developed for various tasks such as creating and managing virtual machines, automating deployment of resources, and managing security policies.

book-of-knowledge icon book-of-knowledge

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

cisco-notes icon cisco-notes

This GitHub repository contains my Cisco studies, notes, and configuration examples. As a networking enthusiast, I have been studying and practicing with Cisco networking devices for a while. This repository serves as a reference for my personal studies and can be helpful for anyone interested in Cisco networking.

clamav icon clamav

ClamAV - Documentation is here: https://docs.clamav.net

cloud-base icon cloud-base

This repository is dedicated to documenting experiences and insights on Azure and Oracle Cloud, with a particular emphasis on Virtual Machine (VM) technologies and open source software

commix icon commix

Automated All-in-One OS Command Injection Exploitation Tool.

comptia-studies icon comptia-studies

My GitHub repository about my CompTIA studies and certifications is a collection of notes, resources, and projects related to my CompTIA exams. I use this repository to keep track of my progress, store my study materials, and share my knowledge with others.

convert2rhel icon convert2rhel

A tool to automate converting Oracle/CentOS/Scientific/Rocky/Alma Linux to Red Hat Enterprise Linux

cve-2023-0297 icon cve-2023-0297

Unauthenticated Remote Code Execution in PyLoad <0.5.0b3.dev31

ffuf icon ffuf

Fast web fuzzer written in Go

free-for-dev icon free-for-dev

A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev

gobuster icon gobuster

Directory/File, DNS and VHost busting tool written in Go

gvmd icon gvmd

Greenbone Vulnerability Manager - The database backend for the Greenbone Community Edition

htb-modules icon htb-modules

Contains a list of all the HackTheBox modules that I've completed so far. As a cybersecurity enthusiast, I've found that working through these modules is a great way to improve my penetration testing skills and keep up with the latest techniques and tools in the field.

htrace.sh icon htrace.sh

My simple Swiss Army knife for http/https troubleshooting and profiling.

legion icon legion

Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.

linux-build icon linux-build

Building a Debian Linux server on bare metal using a AMD TRx24, Nvidia-3070, and 128gb memory. Sourcing out all drivers. Join the hunt!

maytricks icon maytricks

maytricks is a versatile pentesting automated tool designed to comprehensively scan target systems for vulnerabilities and potential weaknesses. By seamlessly integrating the power of Nmap, Nikto, DirBuster, Gobuster, and Nuclei, maytricks delivers a robust scanning experience that covers network, web, and application security.

mech icon mech

Discover the power of Mech, an automated solution designed to supercharge penetration testing workflows.

ms-learn icon ms-learn

This GitHub repo would serve as a recap of Microsoft Learn modules related to security that I have completed. It would include notes, code snippets, and other resources that I have found useful during my learning journey. The repo would be a useful reference for anyone looking to learn about security on the Microsoft platform.

nuclei icon nuclei

Fast and customizable vulnerability scanner based on simple YAML based DSL.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.