Skip to content
View jz543fm's full-sized avatar
:shipit:
Aiming
:shipit:
Aiming
Block or Report

Block or report jz543fm

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jz543fm/README.md

Welcome to San Andreas, I'm JC (CJ) from Grove Street and also I am DevOps Engineer, before DevOps I was in Software Development (FullStack)

“Success is not final, failure is not fatal: it is the courage to continue that counts.” - Winston S. Churchill


kubernetes logo docker logo gitlab logo vim logo linux logo java logo nginx logo



Pinned

  1. kali-dockerized kali-dockerized Public

    Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux inside with Docker with or without suppo…

    Dockerfile 13 1

  2. starship-conf starship-conf Public

    starship-conf starship.toml

    Shell 10

  3. stress-K8s stress-K8s Public

    Stress testing in Kubernetes cluster

    Dockerfile 4 1

  4. K8s-Prometheus-Node-Exporter K8s-Prometheus-Node-Exporter Public

    Prometheus Node Exporter for Kubernetes, contains DaemonSet and ServicAccount for the DaemonSet. The DaemonSet will deploy on every node Prometheus Node Exporter that will expose metrics by your de…

    1

  5. docker-parrot docker-parrot Public

    Parrot OS (Core/Security) or just Parrot Tools in Docker with the usage of Makefile, Dockerfiles and docker-compose.yaml for Bug Bounty, Penetration Testing, Security Research, Computer Forensics a…

    Makefile 1

  6. heuristic-detection heuristic-detection Public

    This master thesis aims to develop an architecture for automated heuristic phishing detection. The outcome of this approach is to evaluate phishing URLs using an automated solution.

    HTML