Skip to content
View Afnaan-Ahmed's full-sized avatar

Highlights

  • Pro

Block or report Afnaan-Ahmed

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Afnaan-Ahmed/README.md

Hi there ๐Ÿ‘‹ I'm Mohammed Afnaan Ahmed

  • I'm either building stuff, breaking said stuff, or doing both!
  • I share quality content about Cyber Security on Linkedin and Medium.
  • I also host hacking challenges on my website, go wild and test your skills on this one.

๐Ÿ“Š GitHub Stats

Afnaan's GitHub Stats Top Languages


๐Ÿ† Certifications & Training

  • CompTIA Security+ (SY0โ€‘701)
  • ISC2 Certified in Cybersecurity (CC)
  • Ethical Hacking Essentials (EHE) @ EC-Council
  • Practical Ethical Hacking (PEH) @ TCM-Security
  • PWST, OSINT Fundamentals, External Pentest Playbook @ TCM-Security
  • And a lot more....

๐Ÿ“š More Content

I also write about secure development, security, and privacy:

  • "I Built a Portfolio Website Thatโ€™s (Almost) Unhackableโ€Šโ€”โ€ŠHereโ€™s How"
  • "Plug, Boot, Vanish: How I Turned a USB Stick into a Portable Privacy Fortress"

Read more about it on my Medium page

--

Let's connect on Linkedin

--

Thanks for stopping by! Letโ€™s build secure and user-friendly experiences together ๐Ÿ˜Š

Pinned Loading

  1. Project-Overhaul Project-Overhaul Public

    Project Overhaul: Command-line tool for streamlined and simplified penetration testing. Coupled with an intuitive interface and a comprehensive collection of integrated security tools.

    Python

  2. nmap-command-generator nmap-command-generator Public

    Python based command line tool that asks user for input and generates nmap commands according to the input.

    Python 1

  3. Raspberry-Pi-Pico-HID-Attack Raspberry-Pi-Pico-HID-Attack Public

    This project demonstrates how the Raspberry Pi Pico can be used to simulate HID attacks. This Proof of Concept illustrates the risks and emphasizes the need for secure device handling.

    Python

  4. auto-shutdown-after-download auto-shutdown-after-download Public

    Monitors Chromium-based browser downloads and automatically shuts down the PC when all downloads are complete. Works with .crdownload files.

    Shell

  5. recursive-rename-script recursive-rename-script Public

    This script recursively renames files, folders, subfolders and removes a supplied substring from all file names.

    Python

  6. ctf-scripts ctf-scripts Public

    This Repository contains all of the scripts that I've written for automating CTF challenges.

    Python