Skip to content
View webpro255's full-sized avatar

Block or report webpro255

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
webpro255/README.md

Hi there! ๐Ÿ‘‹ I'm David (aka WebPro) ๐Ÿš€

๐ŸŽฉ Cybersecurity Enthusiast | Blue Team Specialist | Creative Technologist


๐Ÿง‘โ€๐Ÿ’ป About Me:

  • ๐ŸŒŸ Obsessed with cybersecurity, creative tech and cool tools.
  • ๐Ÿ› ๏ธ Tinkering with tools, committing small victories and learning along the way.
  • ๐ŸŽฎ Gamer by night sometimes, tech student all the time.

๐Ÿ”ฅ GitHub Highlights

๐Ÿ GitHub Snake Game

Watch my contributions come alive as a snake eats the grid! I believe in progress over perfection! My commits tell the story: GitHub Snake Game

๐ŸŽ‰ Fun Facts About Me:

  • ๐ŸŒŽ From old bulky servers to agile clouds, itโ€™s been a journey.
  • ๐Ÿ•น๏ธ Wife's Red shoes? Check. Baby blue suit? Double-check.

๐Ÿ’ป I recently created a interesting app that uses AI to classify event logs.

  1. It uses AI to classify event logs and highlight anomalies.
  2. Built using Python with an interactive GUI.
  3. First-of-its-kind logger designed for cybersecurity enthusiasts!

๐Ÿ“น Event Log with AI in Action!

Click to view the demo!

๐Ÿ’ฌ What Do You Think?

๐Ÿ“ Leave your comments and feedback below!

Should I continue developing this as a Windows program or move on to something else?

โžก๏ธ Share your thoughts in the Discussion Section
#๐Ÿ’ก Found a bug or have an idea? Head to Issues


โœจ Let's Connect!


โ€œCode, commit, repeat โ€“ and throw in some fun along the way.โ€ ๐Ÿ’ป


Pinned Loading

  1. network-anomaly-detection network-anomaly-detection Public

    A Network Anomaly Detection system that leverages machine learning to monitor and identify unusual activities in network traffic in real-time. This project is designed to enhance network security bโ€ฆ

    Python 4 1

  2. iam-policy-simulator iam-policy-simulator Public

    A web application to visualize AWS IAM policies as interactive graphs. This tool allows users to paste their IAM policies and instantly see a visual representation, making it easier to understand aโ€ฆ

    HTML 1

  3. ELK-SOC-Tips ELK-SOC-Tips Public

    A comprehensive guide for SOC analysts on using the ELK Stack (Elasticsearch, Logstash, Kibana) for log analysis and incident response. This repository includes tips, tricks, and best practices forโ€ฆ

    2

  4. Windows-Sysmon-Threat-Hunting-Guide Windows-Sysmon-Threat-Hunting-Guide Public

    A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.

    1

  5. sysmon-config sysmon-config Public

    Forked from SwiftOnSecurity/sysmon-config

    Sysmon configuration file template with default high-quality event tracing

    1

  6. XSS-Payload-Generator XSS-Payload-Generator Public

    A customizable XSS payload generator for ethical hacking and WAF testing purposes.

    HTML