Skip to content
View abdulkadir-gungor's full-sized avatar
Block or Report

Block or report abdulkadir-gungor

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
abdulkadir-gungor/README.md

@abdulkadir-gungor



👨‍💻 About Me :

  • 👋 Hi, I’m @abdulkadir-gungor
  • 👀 I’m interested in "Cyber Security", "Malware Analysis" and "Data Analysis"
  • 🌱 I’m currently learning Assembly, C, Java, Python, Ruby, Matlab, Linux Kernell, Windows Kernel etc.
  • 💞️ I’m looking to collaborate on "Cyber Security" and "Malware Analysis"
  • 📫 How to reach me "abdulkadir_gungor@outlook.com"

🛠️ Languages and Tools :




👏 Contributions to Cyber Security

  Some of the cybersecurity vulnerabilities I reported.

  • VULN-077956 ~~ Sept/2022 ~~ Microsoft Security Response Center ~~ Tampering/Bug/Security Feature Bypass
  • VULN-068278 ~~ May/2022 ~~ Microsoft Security Response Center ~~ Security Feature Bypass
  • Free book download vulnerability ~~ Apr/2021 ~~ packtpub.com
  • Bluekeep vulnerability ~~ Oct/2019 ~~ alibaba.com
  • Bluekeep vulnerability ~~ Oct/2019 ~~ amazon.com

...

  • Web Panel Vulnerability ~~ Oct/2005 ~~ Balıkesir University ~~ Being an Admin without a password in the web panel

📝 🇹🇷 Turkish Documents :

 You can access some of the documents I have prepared from the link below.

 [Hazırladığım bazı dökümanlara aşağıdaki linkten ulaşabilirsiniz.]

  • Block Zinciri Teknolojisi
  • Malware Analizi: Örnek Bir Uygulama Geliştirmesi ve Değerlendirmesi
  • Bir Siber Saldırı Senaryousu
  • Snort Programı
  • USB Belleğin FTK Imager Programı ile İncelenmesi
  • Veritabanı: MySQL Uygulaması
  • Yapay Zekanın Kullanım Alanları ve Geleceği

...

Documents

Pinned

  1. JPGtoMalware JPGtoMalware Public

    It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in…

    Python 363 78

  2. HtmlSmuggling HtmlSmuggling Public

    HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys th…

    Python 93 20

  3. ZIPtoMalware ZIPtoMalware Public

    It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In thi…

    Python 37 17

  4. Ghost Ghost Public

    "Ghost (RAT)" -> Reverse shell and management console for Windows

    Python 17 5

  5. Shodan_Search Shodan_Search Public

    Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.

    Python 16 4

  6. Block_Smartscreen_and_Security_Center_on_Windows_Operating_Systems Block_Smartscreen_and_Security_Center_on_Windows_Operating_Systems Public

    Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems

    Python 11 4