Skip to content
View notnue's full-sized avatar
πŸ’­
πŸ’­
Block or Report

Block or report notnue

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
notnue/README.md

Thanks for stumbling upon my small stake of the Internet; I'm happy you're here.

About me

My name is Neelesh Patel. I'm an active Cyber Security Learner who spends his spare time exploring security rabbit holes that help him to get things done faster. All I need is just my ten fingers and sometimes {coffee}, to talk to computers.

Find Me

LinkedIn: https://www.linkedin.com/in/user-neeleshpatel
TryHackMe: https://tryhackme.com/p/cyberbreath
Github: https://github.com/notnue
Website: https://notnue.github.io
Medium: https://trysec.medium.com

Proabably by OSINT || SOCMINT || Dorks || Shodan || The World of INTERNET

Visitor count

Pinned

  1. Virtual-Vulnerable-Linux-Machine-for-Penetration-Testing-and-Exploitation Virtual-Vulnerable-Linux-Machine-for-Penetration-Testing-and-Exploitation Public

    This Linux Virtual Machine is designed with several vulnerabilities that includes ports obfuscation configurations , architecture based on real scenarios , altered/hindered shells, privilege escala…

    6

  2. ICAN--Implementation-with-Configuration-Architecture-of-university-Network ICAN--Implementation-with-Configuration-Architecture-of-university-Network Public

    Dynamic B.Tech network design with configurations and implementations of 𝗒𝗦𝗣𝗙, π—”π—–π—Ÿπ˜€, 𝗑𝗔𝗧, 𝗗𝗛𝗖𝗣 π˜€π—²π—Ώπ˜ƒπ—²π—Ώ, 𝗗𝗑𝗦 π—Ώπ—²π˜€π—Όπ—Ήπ˜‚π˜π—Άπ—Όπ—»π˜€ etc. Each devices are configured with strong passphrases --> can't be breached…

    1

  3. nuespionage nuespionage Public

    Automating fundamental espionage techtic to gain initial footholds of the target

    Shell 2