Skip to content
View x0prc's full-sized avatar
πŸ‘Ύ
error driven developer
πŸ‘Ύ
error driven developer

Highlights

  • Pro

Block or report x0prc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
x0prc/README.md
pr0xc@proficious.local:~$ neofetch

   ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
   ┃   x0prc@proficious.local             ┃
   ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛

OS:            GNU/Linux
Role:          Undergrad Student
Location:      India
Interests:     Malware Reverse Engineering, Machine Learning
Editors:       vim, zed

Contact:
  Twitter:     @pr0xc
  Telegram:    @pr0xc

Currently Working On:
  - Infosecurity Tools
  - DS & Algorithms in Java
  - Research Paper Implementations

Featured Repos:
  [notes]         github.com/x0prc/notes
  [Dev]           github.com/x0prc/Dev
  [HSC-2FA]       github.com/x0prc/HSC-2FA
  [jangal.c]      github.com/x0prc/jangal.c
  [tridrasil-go]  github.com/x0prc/tridrasil-go

#   Minimal. Modular. Proficious.

Pinned Loading

  1. SymmetrySyndicate/symfetch SymmetrySyndicate/symfetch Public

    fetch that we wanted

    Rust 1

  2. SymmetrySyndicate/jangal SymmetrySyndicate/jangal Public

    trees, forests, graphs

    Rust 1

  3. DRL-CSec DRL-CSec Public

    Implementation of the Paper Titled : Deep Reinforcement Learning for Cyber Security

    3

  4. UBMAD UBMAD Public

    Based on the algorithms published in Paper Titled : Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms.

    Jupyter Notebook 3