Skip to content
View basimnawaz6's full-sized avatar

Highlights

  • Pro

Block or report basimnawaz6

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
basimnawaz6/README.md

Hi πŸ‘‹, I'm Basim Nawaz

Dynamic Titles

πŸ” Ethical Hacker β€’ πŸ’» Software Engineer β€’ πŸš€ Founder of Tech Hierarchy


🌟 Elite Highlights

  • πŸ₯‡ Top 2% on TryHackMe | ICPC Participant
  • πŸ›‘ Penetration Testing β€’ Vulnerability Assessment β€’ SOC Operations
  • πŸ’‘ Teaching Assistant @ PUCIT
  • πŸ‘₯ 5k+ learners mentored via Tech Hierarchy

🌐 Connect in the Matrix


πŸ”’ Cybersecurity Toolkit


πŸ’» Developer Stack


πŸ“Š Live System Stats


root@basim:~$ Stay curious. Stay secure.

Pinned Loading

  1. Cyber-Attack-Case-Studies Cyber-Attack-Case-Studies Public

    A curated collection of real-world cyber incident case studies with detailed reports, technical analysis, and prevention strategies. Each case study includes a structured summary and full PDF repor…

  2. PassStr PassStr Public

    PassStr is a Python-based tool that checks if a given password is part of a known leaked password dataset. It also evaluates the strength of the password and provides actionable feedback to help us…

    Python

  3. EternalBlue-Lab EternalBlue-Lab Public

    A controlled demonstration of the MS17-010 (EternalBlue) vulnerability against unpatched Windows 7, including exploitation, post-exploitation, and remediation strategies. For educational purposes o…

  4. Metasploitable2 Metasploitable2 Public

    Metasploitable 2 Vulnerability Assessment | Full Security Audit & Exploitation Walkthrough A detailed penetration testing report demonstrating the identification and exploitation of critical vulner…