View Code? Open in Web Editor
NEW
This project forked from jwasham/coding-interview-university
A complete computer science study plan to become a software engineer.
License: Creative Commons Attribution Share Alike 4.0 International
coding-interview-university's Introduction
Hi š, I'm Bhaskar Pal, aka 0xStarlight
A passionate cybersecurity enthusiast and programmer looking to render the best of my knowledge and skills
![image](https://user-images.githubusercontent.com/59029171/162222621-7e7fbad3-4f33-4964-94a8-6f6189e97142.png)
- ā” I'm a passionate cybersecurity enthusiast and programmer looking to render the best of my knowledge and skills
- ā” Iām currently learning Offensive Security for OSEP and preparing for OSED
- ā” I'm currently publishing blogs about Active Directory Attacking and Defending on my blog
- ā” I regularly write articles about Cybersecurity, Red Teaming, and CTF writeups on https:/0xStarlight.github.io/
- ā” How to reach me [email protected]
![image](https://user-images.githubusercontent.com/59029171/162222621-7e7fbad3-4f33-4964-94a8-6f6189e97142.png)
- ā” Certified Red Team Lead (CRTL) in 2023
- ā” Certified Red Team Expert (CRTE) in 2023
- ā” Darkweb Operations - Security Blue Team in 2023
- ā” Threat Model - Antisyphon in 2023
- ā” Enterprise Forensics and Response - Antisyphon in 2023
- ā” HackTheBox Prolabs - RastaLabs in 2022
- ā” Certified Red Team Operator (CRTO) in 2022
- ā” HackTheBox Prolabs - OffShore in 2022
- ā” Active Defence Cyber Deception - ANTISYPHON in 2022
- ā” Practical Malware Analysis & Triage - TCMSEC in 2022
- ā” Certified Red Team Professional (CRTP) in 2022
- ā” eLearnSecurity Junior Penetration Tester (eJPT) in 2021
- ā” Offensive Pentesting Path from TryHackMe in 2021
- ā” CompTIA Pentest+ Learning Path from TryHackMe in 2021
- ā” Advent-of-Cyber-2021 from TryHackMe
- ā” PNPT course Path from TCMSEC in 2021
![image](https://user-images.githubusercontent.com/59029171/162222621-7e7fbad3-4f33-4964-94a8-6f6189e97142.png)
- ā” Achieved the rank of 141/6483 teams at HackTheBox Cyber Apocalypse 2023 CTF competition with Activate Windows.
- ā” Achieved the rank of the top 20 teams at Standoff365 2023 CTF competition with Activate Windows.
- ā” Achieved HackTheBox HallOfFame top 50 and top 2 in India (2022)
- ā” Achieved the rank of 13 at DEADFACE 2022 CTF competition with Activate Windows
- ā” Achieved the rank of 32 at Synack 2022 CTF competition with Activate Windows
- ā” Achieved the rank of 4 at Standoff365 2022 CTF competition with Activate Windows
- ā” Achieved the rank of 43/7024 teams at HackTheBox Cyber Apocalypse 2022 CTF competition
- ā” Achieved the rank of 4579 at Google's 2022 Hashcode competition
- ā” Achieved the rank of 82/648 teams at DEF CON 29 Red Team 2021 CTF competition
- ā” Achieved the rank of 300/4740 teams at HackTheBox Cyber Apocalypse 2021 CTF competition
- ā” Achieved the rank of 1020/6491 players at NahamCon 2021 CTF competition
![image](https://user-images.githubusercontent.com/59029171/162222621-7e7fbad3-4f33-4964-94a8-6f6189e97142.png)
![Twitter Follow](https://camo.githubusercontent.com/12ad7f8cc3337d32a0f7025617adb270a01fce7b938c23cd73ed62c6e9695d66/68747470733a2f2f696d672e736869656c64732e696f2f747769747465722f666f6c6c6f772f426861736b617270616c5f5f3f636f6c6f723d626c7565266c6162656c3d666f6c6c6f77253230253430426861736b617270616c5f5f266c6f676f3d74776974746572267374796c653d666f722d7468652d6261646765)
![image](https://user-images.githubusercontent.com/59029171/162222621-7e7fbad3-4f33-4964-94a8-6f6189e97142.png)
![HackTheBox](https://camo.githubusercontent.com/9c9206a4718924da0ef945df700edb90f510baa15178be9bc85cebb30598fc3b/68747470733a2f2f7777772e6861636b746865626f782e65752f62616467652f696d6167652f323434353635)
![image](https://user-images.githubusercontent.com/59029171/162222621-7e7fbad3-4f33-4964-94a8-6f6189e97142.png)
![0xStarlight github stats](https://camo.githubusercontent.com/cf935e29e07b6980c2ac9c38849e5fae5f146eacce4b26ae194f71b4b00c2776/68747470733a2f2f6769746875622d726561646d652d73746174732e76657263656c2e6170702f6170693f757365726e616d653d3078537461726c696768742673686f775f69636f6e733d74727565267468656d653d746f6b796f6e69676874)
![0xStarlight github streak](https://camo.githubusercontent.com/3c75cf07c01c99c650ac34c3492828ac8b29091910138f03622f469449f7642b/68747470733a2f2f6769746875622d726561646d652d73747265616b2d73746174732e6865726f6b756170702e636f6d2f3f757365723d3078537461726c69676874267468656d653d746f6b796f6e6967687426686964655f626f726465723d66616c7365)
![0xStarlight github top_languages](https://camo.githubusercontent.com/71979c17f9fd98ae2c45cfc30576aaa39542265b2d0e00f5911824d47bdad956/68747470733a2f2f6769746875622d726561646d652d73746174732d7369676d612d666976652e76657263656c2e6170702f6170692f746f702d6c616e67732f3f757365726e616d653d3078537461726c69676874266c61796f75743d636f6d70616374266c616e67735f636f756e743d3136267468656d653d746f6b796f6e69676874)
![image](https://user-images.githubusercontent.com/59029171/162222621-7e7fbad3-4f33-4964-94a8-6f6189e97142.png)
![](https://camo.githubusercontent.com/a84ef29def756a3210f9eb20caab444b55e60d0538a0ba5f37bc4d926a1d002d/68747470733a2f2f696d672e6275796d6561636f666665652e636f6d2f627574746f6e2d6170692f3f746578743d427579206d6520616e204f5345503f26656d6f6a693d26736c75673d3078537461726c6967687426627574746f6e5f636f6c6f75723d62383665313926666f6e745f636f6c6f75723d66666666666626666f6e745f66616d696c793d506f7070696e73266f75746c696e655f636f6c6f75723d66666666666626636f666665655f636f6c6f75723d464644443030)
coding-interview-university's People