Skip to content
View EndpointDay's full-sized avatar
πŸ’»
πŸ’»
  • DaySec INC.

Block or report EndpointDay

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
EndpointDay/README.md

Hi, I'm Endpoint from DaySec!


🚨 Disclaimer:

All repositories or starred projects in this profile are for EDUCATIONAL PURPOSES ONLY. I am not responsible for any misuse by others. βŒβœ‹


@EndpointDay
-------------------------
πŸ’» Aspiring Developer & Pentester
🌟 Main languages: Java, Python, HTML
πŸ§‘β€πŸ’» Member of the DaySec team - AntiSec Division

πŸ› οΈ My Favorite Tools

πŸ—„οΈ Databases and Cloud Hosting

GitHub Pages MySQL

πŸ’» Software and Tools

Chrome Colab Codepen Git Stack Overflow Visual Studio Code

Popular repositories Loading

  1. RSA-AES-Encryption RSA-AES-Encryption Public

    a simple project demonstrating symmetric (AES) and asymmetric (RSA) encryption in Java. Includes examples of key generation, encryption, and decryption.

    Java 2

  2. EndpointDay EndpointDay Public

    the README.md for my GitHub bio

    1

  3. Typing-Test Typing-Test Public

    a simple typing tester in HTML, CSS and JS.

    JavaScript 1

  4. Auth-System Auth-System Public

    a simple authentication system made in Java.

    Java 1

  5. PE-x86-Parser PE-x86-Parser Public

    a simple Java parser for 32-bit Portable Executable (PE) files. This tool reads and verifies the DOS and PE headers, extracts COFF header information, and provides insights into the structure of PE…

    Java 1 1

  6. Intrusion-Detection-System Intrusion-Detection-System Public

    a simple Intrusion Detection System (IDS) implemented in Java. This tool analyzes log files for basic intrusion patterns such as multiple failed login attempts or other suspicious activities. Ideal…

    Java 1