Skip to content
View victorkvor's full-sized avatar
  • 📍 Valencia, Spain

Block or report victorkvor

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
victorkvor/README.md

ᴀʙᴏᴜᴛ ᴍᴇ

About Me Terminal GIF

ᴛᴇᴄʜ ꜱᴛᴀᴄᴋ

🎓 ᴇᴅᴜᴄᴀᴛɪᴏɴ

👨🏻‍💻 ʟᴀɴɢᴜᴀɢᴇꜱ & ꜱᴄᴍ

🌐 ᴡᴇʙ & ᴅᴀᴛᴀʙᴀꜱᴇꜱ

🛡️ ᴄʏʙᴇʀꜱᴇᴄᴜʀɪᴛʏ




ᴄᴇʀᴛɪꜰɪᴄᴀᴛɪᴏɴꜱ

🗓️ Jan 2025
Credential
Security &
Compliance
🗓️ Dec 2024
Credential
Azure Cloud
Concepts
🗓️ Dec 2024
Credential
AI & Machine
Learning
🗓️ Dec 2024
Credential
Core Data
Concepts
🗓️ Sep 2025
Credential
Network
Fundamentals
🗓️ Dec 2024
Credential
Ethical
Hacking

ɢɪᴛʜᴜʙ ꜱᴛᴀᴛꜱ


Popular repositories Loading

  1. siem-project-splunk-snort-ossec siem-project-splunk-snort-ossec Public

    This project sets up a security monitoring lab to analyze and respond to security incidents using tools like Splunk Enterprise, Snort, and TestmyNIDS. Leveraging NetinVM for virtualization, it crea…

    3

  2. business-network-topology business-network-topology Public

    A packet tracer project that represents a secure network topology design for a medium-small IT consulting business to ensure efficient operations, secure data management, and seamless communication.

    2

  3. server-multiclient-drones server-multiclient-drones Public

    Simulates a distributed system where drone clients send 3D coordinates to a server. The server manages client connections, assigns IDs, and forwards position updates within client groups for effici…

    Java 1

  4. wordle-game wordle-game Public

    A Java-based Wordle game using Model-View-Controller (MVC) architecture. Player 1 selects a word, and Player 2 guesses it within 8 attempts. Features include a ranking system, feedback indicators, …

    Java 1

  5. honeynet-vs-deception_technologies honeynet-vs-deception_technologies Public

    This project aims to set-up a Honeynet, analyse the segreggated data by each honeypot, in order to seek a general attack pattern, describing the limitations and features provided in comparison to a…

    1

  6. wannacry-vs-lockbit wannacry-vs-lockbit Public

    This repository is based on my Bachelor's Thesis for my Computer Engineering degree at the University of Valencia and contains all my findings, reports, and scripts of two ransomware families: Wann…

    YARA 1