Skip to content
View TailoredAccessOperations's full-sized avatar

Organizations

@yetbio

Block or report TailoredAccessOperations

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

d00000000000000000000000000000000000000000000000000000000000000000000d

tailoredaccessoperations

tailoredaccessoperations

  • 🔭 I’m currently working on HackThePlanet

  • 🌱 I’m currently learning Cloudflare Workers, Android Security, OpSec

  • 🤝 I’m looking for help with HackThePlanet

  • 💬 Ask me about Linux, System Engineering,

  • 📫 How to reach me x@htp.sh

  • ⚡ Fun fact Did you know that the first computer virus ever created was called the "Creeper virus" in the early 1970s? It wasn’t malicious—it just displayed the message “I’m the creeper, catch me if you can!” It was actually more of a prank than a real threat. The first antivirus software was created to catch it, and it was called the "Reaper." So, in a way, antivirus software was invented just to catch the world’s first computer prankster!

Connect with me:

avunit

Languages and Tools:

android angular angularjs aws azure bash c css3 django docker dotnet elasticsearch electron express firebase gcp git grafana heroku html5 java javascript kibana kotlin kubernetes linux mariadb mongodb mssql mysql nextjs nginx nodejs openresty oracle php postgresql postman python pytorch react reactnative redis redux rust selenium solr spring sqlite tailwind tensorflow typescript

tailoredaccessoperations

 tailoredaccessoperations

tailoredaccessoperations

000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f

Pinned Loading

  1. Keybase proof @Linux Keybase proof @Linux
    1
    ### Keybase proof
    2
    
                  
    3
    I hereby claim:
    4
    
                  
    5
      * I am tailoredaccessoperations on github.
  2. ai-hacking ai-hacking Public

    Forked from ollama/ollama

    Initiate protocol: prime Llama 3.1, infiltrate Mistral's neural networks, and hijack Gemma 2's cognitive algorithms - with the ultimate objective of subverting AI supremacy.

    Go 1

  3. OpSec OpSec Public

    Operational Security (OpSec) Toolkit – a comprehensive repository designed for security professionals, tech enthusiasts, and privacy advocates. This repository provides a curated collection of tool…

    7

  4. ELFKickers ELFKickers Public

    C

  5. romantic1337 romantic1337 Public

    Forked from hopelessromantic1337/hopelessromantic1337

    Config files for my GitHub profile.

    HTML

  6. boot boot
    1
    #!/usr/bin/env bash
    2
    
                  
    3
    #### VARIABLES / options
    4
    # Force APT to use IPv4
    5
    XS_APTIPV4="yes"