Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View GihanIT's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report GihanIT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
GihanIT/README.md
  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–ˆ    β–ˆβ–ˆ     β–ˆβ–ˆ   β–ˆβ–ˆ  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆ β–ˆβ–ˆβ–ˆ    β–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  
 β–ˆβ–ˆ       β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆ   β–ˆβ–ˆ     β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ 
 β–ˆβ–ˆ   β–ˆβ–ˆβ–ˆ β–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆ β–ˆβ–ˆ  β–ˆβ–ˆ     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆ β–ˆβ–ˆ β–ˆβ–ˆ  β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ 
 β–ˆβ–ˆ    β–ˆβ–ˆ β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ  β–ˆβ–ˆ β–ˆβ–ˆ     β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ β–ˆβ–ˆ  β–ˆβ–ˆ β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ 
  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆβ–ˆβ–ˆ     β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆ   β–ˆβ–ˆ β–ˆβ–ˆ   β–ˆβ–ˆ 
Typing SVG

Visitor CountΒ  GitHub GihanITΒ  BlogΒ 

πŸ‘¨β€πŸ’» whoami

$ cat about.txt
{
  "name": "Gihan Harindra",
  "role": "Cybersecurity Enthusiast",
  "background": "ICT Educator",
  "location": "Sri Lanka πŸ‡±πŸ‡°",
  "interests": [
    "Penetration Testing",
    "Network Security",
    "Ethical Hacking",
    "Security Research",
    "Teaching ICT"
  ],
  "currently_learning": [
    "Advanced Exploitation Techniques",
    "Red Team Operations",
    "Malware Analysis",
    "Cloud Security"
  ],
  "motto": "break it to understand it"
}

🎯 Current Focus

#!/usr/bin/env python3

class CyberSecurityJourney:
    def __init__(self):
        self.skills = ["Pentesting", "Network Analysis", "OSINT", "Teaching"]
        self.certifications_pursuing = ["CEH", "OSCP", "CompTIA Security+"]
        
    def daily_routine(self):
        return [
            "πŸ” Hunt vulnerabilities",
            "πŸ“š Learn new attack vectors",
            "πŸ’‘ Share knowledge with students",
            "πŸ›‘οΈ Build defensive strategies",
            "⚑ Solve CTF challenges"
        ]

⚑ Tech Arsenal

languages tools frameworks

πŸ” Cybersecurity Toolkit

πŸ”΄ Offensive Security        πŸ”΅ Defensive Security       🟒 Development
β”œβ”€ Metasploit               β”œβ”€ Wireshark                β”œβ”€ Python Scripts
β”œβ”€ Burp Suite               β”œβ”€ Snort/Suricata           β”œβ”€ Bash Automation
β”œβ”€ Nmap                     β”œβ”€ SIEM Tools               β”œβ”€ Web Apps
β”œβ”€ SQLmap                   β”œβ”€ Firewalls                β”œβ”€ Network Tools
β”œβ”€ Hydra                    └─ IDS/IPS                  └─ Pentesting Tools
└─ Custom Exploits

Holopin Badges


πŸ“Š GitHub Stats


πŸ“ˆ Profile Summary Cards


πŸ† Achievement Unlocked


πŸŽ“ Teaching & Sharing Knowledge

# As an ICT educator, I believe in:
$ echo "Knowledge shared is knowledge squared"
  • 🏫 Teaching ICT fundamentals and programming to students
  • πŸ’» Creating engaging educational content for technology learners
  • πŸ” Introducing cybersecurity concepts and digital safety awareness
  • 🌟 Mentoring the next generation of tech enthusiasts
  • πŸ“š Developing practical, hands-on learning experiences

πŸ”— Connect With Me

ICTDIFF.LK LinkedIn Twitter Facebook YouTube TikTok


╔══════════════════════════════════════════════════════════════╗
β•‘  "The only truly secure system is one that is powered off,   β•‘
β•‘   cast in a block of concrete and sealed in a lead-lined     β•‘
β•‘   room with armed guards." - Gene Spafford                   β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

πŸ’š Thanks for visiting!

Pinned Loading

  1. Phantom-Crawler Phantom-Crawler Public

    A lightweight, multi-threaded web application reconnaissance and security testing tool. Features include crawling, JavaScript analysis, secret detection, GraphQL probing, JWT analysis, security hea…

    Python 2