Skip to content

uruskan/uruskan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

48 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Welcome to my profile / Profilime hoşgeldiniz πŸ‘‹

![Watch the video/Videoyu Δ°zle]

Typing SVG

⚑ Average Tech Priest

Top Langs

πŸ“« How to reach me: LinkedIn πŸ“« Discord: uruskan. πŸ“« E-Mail: auruskan@outlook.com

Warhammer GIF Access Denied GIF


πŸ“ About Me

I have started my tech journey from the young age of 13. As a youngster living in a power plant my only friends were electrical engineers and my toys were pcbs. My experience is as diverse as it goes, I am still trying to be the best at whatever takes my interest. I am also a very competitive enduro rider, dota player and a powerlifter -better way to say fat lmao-. I use arch btw.


🌐 Frontend Technologies

Mastery in Crafting User Experiences

My frontend expertise spans creating seamless and dynamic user experiences using the latest and most powerful technologies available. I build responsive, high-performance applications with intuitive interfaces that delight users and drive engagement.

  • Next.js
  • React
  • JavaScript
  • Redux
  • Tailwind CSS
  • Bootstrap
  • CSS3
  • HTML5
  • TypeScript
  • Vue.js
  • Angular
  • Svelte
  • GraphQL
  • Apollo Client
  • Styled Components
  • Jest
  • Cypress
Next.js React JavaScript Redux Tailwind CSS Bootstrap CSS3 HTML5 TypeScript Vue.js Angular Svelte GraphQL Apollo Client Styled Components Jest Cypress

πŸš€ Backend Technologies

Architecting Robust and Scalable Backends

In the backend domain, I excel in building highly scalable, secure, and efficient server-side applications. My work ensures seamless data flow, robust API integrations, and secure data management. I leverage microservices architecture, serverless computing, and cloud-native solutions to build resilient and scalable backend systems.

  • Node.js
  • Express.js
  • Laravel
  • Python
  • Go
  • Rust
  • Java
  • Spring Boot
  • Ruby on Rails
  • PHP
  • Django
  • Flask
  • Koa.js
  • Hapi.js
  • FastAPI
  • GraphQL
  • Apollo Server
  • Firebase Functions
Node.js Express.js Laravel Python Go Rust Java Spring Boot Ruby on Rails PHP Django Flask Koa.js Hapi.js FastAPI GraphQL Apollo Server Firebase Functions

πŸ—„οΈ Databases

Mastery in Data Management

Handling data with precision and ensuring optimal performance and security is a cornerstone of my work. I have extensive experience in both SQL and NoSQL databases, ensuring robust data models, efficient queries, and secure transactions.

  • MongoDB
  • Firebase
  • MySQL
  • PostgreSQL
  • SQLite
  • Redis
  • Cassandra
  • DynamoDB
  • Oracle Database
  • Microsoft SQL Server
MongoDB Firebase MySQL PostgreSQL SQLite Redis Cassandra DynamoDB Oracle Database Microsoft SQL Server

πŸ› οΈ Development Tools and Methodologies

A Comprehensive Arsenal for Development and Innovation

My toolkit is expansive, encompassing a wide range of tools and technologies that enable me to deliver cutting-edge solutions. From version control and containerization to continuous integration and deployment, I leverage the best tools to streamline development and ensure high-quality results.

  • Version Control: Git, SVN
  • Containerization: Docker, Kubernetes
  • CI/CD: Jenkins, Travis CI, CircleCI, GitHub Actions
  • Configuration Management: Ansible, Puppet, Chef
  • Virtualization: Vagrant, VMware, VirtualBox
  • Monitoring and Logging: ELK Stack, Prometheus, Grafana
  • APIs and Web Services: REST, GraphQL, gRPC, SOAP
  • Networking: TCP/IP, DNS, DHCP, Load Balancers, Firewalls
  • Cloud Platforms: AWS, Azure, Google Cloud, DigitalOcean, Heroku
  • Blockchain: Ethereum, Solidity, Hyperledger
  • AI and Machine Learning: TensorFlow, Keras, PyTorch, scikit-learn
  • Quantum Computing: Qiskit, Microsoft Quantum Development Kit
  • IoT: MQTT, CoAP, Zigbee, Z-Wave
Git SVN Docker Kubernetes Jenkins Travis CI CircleCI GitHub Actions Ansible Puppet Chef Vagrant VMware VirtualBox ELK Stack Prometheus Grafana REST GraphQL gRPC SOAP TCP/IP DNS DHCP Load Balancers Firewalls AWS Azure Google Cloud DigitalOcean Heroku Ethereum Solidity Hyperledger TensorFlow Keras PyTorch scikit-learn Qiskit Microsoft Quantum Development Kit MQTT CoAP Zigbee Z-Wave

πŸ”’ Cybersecurity and Ethical Hacking

With an extensive background in cybersecurity, I have mastered various techniques and tools to protect, test, and secure systems. My experience spans from ethical hacking to advanced penetration testing and incident response, following industry standards and frameworks to ensure robust security.

Key Areas of Expertise:

  • Penetration Testing:

    • Conducting comprehensive penetration tests to identify vulnerabilities in networks, applications, and systems.
    • Tools: Metasploit, Burp Suite, OWASP ZAP, Nmap.
    • Frameworks: OWASP Testing Guide, PTES (Penetration Testing Execution Standard).
  • Network Security:

    • Configuring and securing network infrastructure with firewalls, IDS/IPS systems, and network monitoring tools.
    • Tools: Wireshark, Snort, Suricata.
    • Standards: NIST SP 800-53, ISO/IEC 27001.
  • Reverse Engineering:

    • Disassembling and analyzing software to understand its functionality and identify security flaws.
    • Tools: IDA Pro, Ghidra, x86/x64 Assembly.
    • Techniques: Static and dynamic analysis, decompilation.
  • Exploit Development:

    • Developing custom exploits for vulnerabilities in software and hardware.
    • Techniques: Buffer overflow, ROP (Return Oriented Programming), shellcoding.
    • Resources: Exploitation books such as "Hacking: The Art of Exploitation" and "The Shellcoder's Handbook".
  • Web Application Security:

    • Securing web applications through code reviews, vulnerability assessments, and implementing best practices.
    • Vulnerabilities: SQL injection, XSS, CSRF, and more.
    • Standards: OWASP Top Ten, ASVS (Application Security Verification Standard).
  • Incident Response:

    • Handling security incidents, conducting forensic analysis, and mitigating threats.
    • Tools: SIEM (Security Information and Event Management) systems, log analysis tools.
    • Frameworks: NIST Computer Security Incident Handling Guide, ISO/IEC 27035.
  • Advanced Persistent Threats (APT):

    • Detecting and defending against sophisticated and prolonged cyber-attacks.
    • Techniques: Persistent backdoors, rootkits, advanced evasion techniques.
    • Standards: MITRE ATT&CK framework, Cyber Kill Chain.
  • Shadow Operations:

    • Involved in covert operations on platforms like mirror-h and golgeler, contributing to understanding the tactics and techniques used by adversaries.
    • Experience: Engaging in real-world cyber operations to gain insights into adversarial behavior and techniques.
  • Security Automation:

    • Developing scripts and tools for automating security tasks and improving efficiency.
    • Languages: Python, Bash, PowerShell.
    • Automation Tools: Ansible, Puppet, Chef.
  • Cryptography:

    • Implementing and analyzing encryption algorithms and secure communication protocols.
    • Algorithms: RSA, AES, hashing algorithms.
    • Standards: FIPS 140-2, ISO/IEC 19790.
  • Social Engineering:

    • Conducting social engineering assessments to identify human vulnerabilities and strengthen organizational security awareness.
    • Techniques: Phishing, pretexting, baiting.
  • Red Teaming:

    • Conducting comprehensive red team assessments to simulate real-world attacks and test the effectiveness of security measures.
    • Standards: Red Team Operations framework, NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment).

Certifications and Standards:

  • Certifications:

  • In Progress

    • Certified Information Systems Security Professional (CISSP)
    • Offensive Security Certified Professional (OSCP)
    • Certified Ethical Hacker (CEH)
    • GIAC Penetration Tester (GPEN)
  • Standards:

    • ISO/IEC 27001: Information Security Management
    • NIST Cybersecurity Framework
    • GDPR: General Data Protection Regulation

My cybersecurity expertise ensures robust protection for any project I undertake, making systems resilient against both common and sophisticated threats. My knowledge of industry standards and frameworks allows me to align security practices with the highest benchmarks, ensuring comprehensive protection and compliance.

A Guardian of the Digital Realm

My deep expertise in cybersecurity and ethical hacking ensures the integrity, confidentiality, and availability of systems and data. From penetration testing to implementing advanced security measures, I safeguard digital assets with precision and diligence.

  • Penetration Testing: Metasploit, Burp Suite, OWASP ZAP, Nessus
  • Network Security: Nmap, Wireshark, Snort, Suricata
  • Cryptography: RSA, AES, SHA, PGP, GPG
  • Forensics: Volatility, Autopsy, Sleuth Kit
  • Reverse Engineering: IDA Pro, Ghidra, Radare2, Binary Ninja
  • Incident Response: SIEM, SOAR, Splunk, ELK Stack
  • Social Engineering: SET, Maltego, BeEF
  • Anonymity and Privacy: Tor, I2P, VPNs
  • Exploitation: Custom Exploits, Buffer Overflows, SQL Injection, XSS, CSRF

πŸ–₯️ Operating Systems

Proficiency Across All Major Operating Systems

I have extensive experience with various operating systems, ensuring seamless integration and deployment across platforms. My expertise spans from traditional UNIX-like systems to modern cloud-based environments, providing a solid foundation for diverse technological ecosystems.

  • Linux: Rocky Linux, CentOS, Red Hat Enterprise Linux (RHEL), Ubuntu, Arch Linux
  • macOS
  • Windows
  • Unix: FreeBSD, OpenBSD, NetBSD
  • Embedded OS: Yocto, Zephyr, FreeRTOS
Rocky Linux CentOS Red Hat Enterprise Linux (RHEL) macOS Ubuntu Arch Linux Windows FreeBSD OpenBSD NetBSD Yocto Zephyr FreeRTOS

πŸ“š Additional Expertise

An Endless Pursuit of Knowledge and Excellence

My commitment to continuous learning and improvement has led me to explore a wide array of technologies and methodologies. I stay at the forefront of industry advancements, ensuring my skills remain sharp and relevant in an ever-evolving landscape.

  • DevOps: Infrastructure as Code (IaC), Continuous Integration/Continuous Deployment (CI/CD), Automated Testing, Monitoring and Logging
  • Cloud Architecture: Multi-Cloud Strategies, Hybrid Cloud, Cloud Migration, Cloud-Native Development
  • Big Data: Hadoop, Spark, Kafka, Flink, NoSQL, Data Lakes, Data Warehousing
  • AI/ML: Deep Learning, Natural Language Processing (NLP), Computer Vision, Reinforcement Learning
  • Quantum Computing: Quantum Algorithms, Quantum Cryptography, Quantum Machine Learning
  • Blockchain: Smart Contracts, Decentralized Applications (DApps), Consensus Algorithms
  • AR/VR: Augmented Reality, Virtual Reality, Mixed Reality, Unity, Unreal Engine
  • Mobile Development: Android, iOS, Cross-Platform Solutions (Flutter, React Native)
  • Microservices: Service Mesh, API Gateway, Circuit Breaker Pattern
  • SEO: Sitemaps, OpenGraph, Google Video Sitemaps, Schema Markup, Rich Snippets, Keyword Optimization
  • Technical SEO and Performance Optimization: Proven ability to develop highly optimized web applications utilizing advanced SEO techniques including sitemaps, Open Graph protocol, Google Video Sitemap, SCHEMA markup, and JSON-LD structured data for superior search engine visibility and organic traffic acquisition.
Ansible Terraform Docker Kubernetes AWS Azure Google Cloud Spark Hadoop Kafka Scala Ethereum Solidity Unity Unreal Engine Flutter Android iOS React Native

Fun Fact: I have been involved in the tech world since I was 13, continuously learning and pushing the boundaries of what is possible.

*https://uruskan.itch.io/planet


About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages