- 👋 Hi, I’m @DeadmanXXXII aka Blu Corbel.
- 👀 I’m interested in Offensive Security.
- I ❤️ Nethunter.
Below is list of repositories, just click.
Computer science algorithms and concepts of use:
I built my own defense systems too. Most are integrable with other services including task managers and boot sequences.
List of local and cloud servers with secure architecture and configurations.
Moves data from one place to another often altering it.
These all produce blocks, values, hashes and tokens. Most you have to input the metadata after creation. One can create an ootb cryptocurrency that can be ran on a windows terminal.
My custom and pre-built matrix of script attacks. If I'm the only collaborative I built it.
How I learned to code.
Operating system CLI's and Terminals I have experience in:
Sub-systems:
Cloud systems:
Networking and Virtualization:
Servers:
IDE's:
Multiple interface compilations:
Builders:
Data:
Quantum: