bl34chig0 / ockam Goto Github PK View Code? Open in Web Editor NEW This project forked from build-trust/ockam 0.0 0.0 0.0 53.62 MB Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale. Use Ockam to build secure-by-design applications that can Trust Data-in-Motion. Home Page: https://ockam.io License: Apache License 2.0 Shell 1.98% JavaScript 0.01% Erlang 0.44% Rust 74.35% Elixir 22.60% TypeScript 0.39% CSS 0.01% Makefile 0.12% Dockerfile 0.01% Svelte 0.11% Introduction · People · Discuss
Hi👋🏽, I'm Habeeb - a jr. penetration tester 🥅 Looking for Entry-level roles in Cybersecurity or IT ✔️ I'm ISC2 Certified in Cybersecurity 👯 I’m looking to collaborate on open-source projects ⚡ Fun fact: I'm an avid FiFa & Call of Duty gamer 🤣 🗣️ Presentation Unmasking Cyber Threats An Offensive Security Approach for Nigerian Businesses: Demonstrated and explained how limit overrun race condition can be exploited in web applications in the fintech space in Nigeria. 🧑🏾💻 Projects: Pentest Resources Python 3 Pentesting Tools Telstra Cybersecurity Virtual Experience Program Technical Skills 📕 Latest Blog Posts Active Directory Explained: Part 3 – Kerberos Authentication Protocol Steganography: Hiding Messages in Plain Sight Social Engineering #2: Recognizing and Defending against common Phishing attacks Social Engineering #1: The Sneaky Tactics Targeting Everyday People OSI Model Hack Your Way into Cybersecurity Mastering Active Directory Part 2 Mastering Active Directory Part 1 ➡️ more blog posts... GitHub Stats Connect with me:
Hi👋🏽, I'm Habeeb - a jr. penetration tester 🥅 Looking for Entry-level roles in Cybersecurity or IT ✔️ I'm ISC2 Certified in Cybersecurity 👯 I’m looking to collaborate on open-source projects ⚡ Fun fact: I'm an avid FiFa & Call of Duty gamer 🤣 🗣️ Presentation Unmasking Cyber Threats An Offensive Security Approach for Nigerian Businesses: Demonstrated and explained how limit overrun race condition can be exploited in web applications in the fintech space in Nigeria. 🧑🏾💻 Projects: Pentest Resources Python 3 Pentesting Tools Telstra Cybersecurity Virtual Experience Program Technical Skills 📕 Latest Blog Posts Active Directory Explained: Part 3 – Kerberos Authentication Protocol Steganography: Hiding Messages in Plain Sight Social Engineering #2: Recognizing and Defending against common Phishing attacks Social Engineering #1: The Sneaky Tactics Targeting Everyday People OSI Model Hack Your Way into Cybersecurity Mastering Active Directory Part 2 Mastering Active Directory Part 1 ➡️ more blog posts... GitHub Stats Connect with me:
Vue.js 🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
javascript JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Machine learning Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Facebook We are working to build community through open source technology. NB: members must have two-factor auth.