Skip to content
View EmadYaY's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report EmadYaY

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
EmadYaY/ReadMe.md

Emad(ARGANEX) - ME

💫 About Me:

🔭 I’m currently working on:
- Advancing my expertise in cybersecurity
- Writing conference papers about cybersecurity, including topics like malware and cyber attacks

👯 I’m looking to collaborate on:
- Cybersecurity research projects and AI and ML
- CTF competitions to enhance my problem-solving and penetration testing skills

🤝 I’m looking for help with:
- Gaining insights into the latest trends and tools in offensive and Purple Team security

💬 Ask me about:
- Penetration testing, bug hunting, and strategies and Ida
- OSINT and social engineering

 alt text

Hope you are great buddy☜(゚ヮ゚☜) I'm Emad, glad you're here ༼ つ ◕_◕ ༽つ Let's start 💻👨🏻‍💻🤑


Publications(Advisory-Research-Writeup):

🕵️‍♂️Research #attack-surfacee #penetration-test :

✍🏻1. - DOI: 10.5281/zenodo.14190725

✍🏻2. - DOI: 10.5281/zenodo.14282576

✍🏻3.

✍🏻4. - DOI: 10.5281/zenodo.14282837

✍🏻5. - DOI: 10.5281/zenodo.14234786

✍🏻6. - DOI: 10.5281/zenodo.14292511

✍🏻7. - DOI: 10.5281/zenodo.14293625

✍🏻8. GitHub - 610 ⭐

✍🏻9.

✍🏻10. - Doi: 10.5281/zenodo.14039895

✍🏻11.

✍🏻12.

✍🏻13.


Honors & awards(also available in LinkedIn profile):

🧑🏻‍💻1. Top 10 WordPress Security Researchers Aug 2023(6th)

🧑🏻‍💻2. Top 10 WordPress Security Researchers Nov 2023(7th)

🧑🏻‍💻3. Top 10 WordPress Security Researchers Dec 2023(7th)

🧑🏻‍💻4. Top 10 WordPress Security Researchers Mar 2024(9th)

Over 65 CVEs ---> Link!


Interviews, podcasts:

🎙️1. Safe Cast N.27: Common WordPress Vunrtablitys 00:10':25" ---> Link!.


🌐 Socials:

X

💻 Tech Stack:

C# C C  Go HTML5 Java JavaScript AssemblyScript Markdown Windows Terminal Shell Script Python PHP .Net Angular Django Flask Flutter NodeJS NPM Vue.js WordPress Apache SQLite MySQL Canva Matplotlib NumPy Pandas TensorFlow Scipy Git

📊 GitHub Stats:



🏆 GitHub Trophies

🔝 Top Contributed Repo


Pinned Loading

  1. HadessCS/Red-team-Interview-Questions HadessCS/Red-team-Interview-Questions Public

    Red team Interview Questions

    616 72

  2. PhishiUrl PhishiUrl Public

    A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recognizing and mitigating homograph attacks.

    Python 26 9

  3. 2FA-Bypass-Techniques 2FA-Bypass-Techniques Public

    A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.

    40 5

  4. 30-Days-Of-Python 30-Days-Of-Python Public

    Forked from Asabeneh/30-Days-Of-Python

    30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace.

    Python 12

  5. Finite-Element-Method Finite-Element-Method Public

    Projects For The Finite Element Method Lesson And The Exercise Answers.

    MATLAB 10

  6. Mechatronics-2 Mechatronics-2 Public

    Hand Tracker Project by Python and Arduino Board

    Python 10