Skip to content
View OsmanKandemir's full-sized avatar
πŸ’»
Focusing
πŸ’»
Focusing

Highlights

  • Pro
Block or Report

Block or report OsmanKandemir

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
OsmanKandemir/README.md

πŸ‘‹ Hi

class README:
    def __init__(self):
        self.username = "Undefined"
        self.name = "Osman"
        self.surname = "Kandemir"
        self.age = "Undefined"
        self.contacts = {
            "Email": "osmankandemir00[@]gmail[.]com",
            "Whatsapp" : "Undefined",
            "Telegram": "Undefined",
            "GSM": "Undefined",
            "PGP" : "Undefined"
        }
        self.location = "localhost, Turkey"
        self.occupation = "Security Consultant, Backend Developer"
        self.operating_system = "Kali Linux, Windows, Debian, Ubuntu, Mint"

πŸ–₯️ Skills

  • Information Security
  • Cyber Security
  • Backend Developer

Programming

Shell Script JavaScript Python Flask Django

Database

MySQL SQLite

Frontend

HTML5 Bootstrap CSS3

πŸ§ͺ QA & Testing

Postman

πŸŽ›οΈ Operating System

Linux Arch Debian Kali Ubuntu Windows

πŸ—„οΈ DevOps & System

Docker Apache Nginx

πŸ“œ Certificates

Name Organization Link
CCNA - Cisco Certified Network Associate Cisco - Netacad https://www.cisco.com
Certified Ethical Hacker V12 EC-Council https://www.eccouncil.org/

Pinned

  1. indicator-intelligence indicator-intelligence Public

    Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.

    Python 85 15

  2. associated-threat-analyzer associated-threat-analyzer Public

    Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious domain and IPv4 lists.

    Python 36 5

  3. web-wordlist-generator web-wordlist-generator Public

    WEB-Wordlist-Generator creates related wordlists after scanning your web applications.

    Python 34 3

  4. PowerSTest PowerSTest Public

    These PowerShell scripts uses for Windows penetration testing.

    PowerShell

  5. deprem-yardim-backend deprem-yardim-backend Public

    Forked from acikyazilimagi/deprem-yardim-backend

    afetharita.com backend projesi

    Python