Skip to content
View Asmae-Amahrouk's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Asmae-Amahrouk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Asmae-Amahrouk/README.md
  • 👋 Hi, I’m @Asmae-Amahrouk
  • 👀 I’m interested in IT domain
  • 🌱 I’m currently learning Cyber Security
  • 💞️ I’m looking to collaborate on Security Projects
  • 📫 How to reach me : LinkedIn @AMAHROUK Asmae

Popular repositories Loading

  1. Anti-Ransomware Anti-Ransomware Public

    Implementing Anti-Ransomware using an IDS based on signatures and an IDS based on system behavior using Machine Learning.

    Python 1

  2. IAM-Solution- IAM-Solution- Public

    This project aims to implement a self-hosted IAM solution leveraging open-source tools to provide secure authentication, authorization, and monitoring.

    Shell 1

  3. Sysmon-Wazuh Sysmon-Wazuh Public

    Implementing a comprehensive and scalable security monitoring solution for Windows endpoint.

    1

  4. Malware_Analysis Malware_Analysis Public

    Analyser un ensemble d'échantillons de logiciels malveillants pour Android en utilisant rétro-ingénierie analyse statique et dynamique afin de savoir comment ces logiciels avaient contourné les mes…

    1

  5. Security_Tools_Comparison Security_Tools_Comparison Public

    Une étude comparative entre les outils de sécurité disponibles dans deux distributions Linux populaires axées sur la sécurité, Kali Linux et Parrot OS. Ces deux distributions sont largement utilisé…

    1

  6. Network_Security_Mini_Projects Network_Security_Mini_Projects Public

    Network Security mini projects: Setting up a firewall, implementing Snort IDS, Utilisation d’un sniffer et d’un scanner de vulnérabilité...etc.

    1