Skip to content
View uruskan's full-sized avatar

Highlights

  • Pro

Block or report uruskan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
uruskan/README.md

Top Langs

📫 How to reach me: LinkedIn 📫 Discord: uruskan. 📫 E-Mail: auruskan@outlook.com


🌐 Frontend Technologies

Mastery in Crafting User Experiences

My frontend expertise spans creating seamless and dynamic user experiences using the latest and most powerful technologies available. I build responsive, high-performance applications with intuitive interfaces that delight users and drive engagement.

  • Next.js
  • React
  • JavaScript
  • Redux
  • Tailwind CSS
  • Bootstrap
  • CSS3
  • HTML5
  • TypeScript
  • Vue.js
  • Angular
  • Svelte
  • GraphQL
  • Apollo Client
  • Styled Components
  • Jest
  • Cypress
Next.js React JavaScript Redux Tailwind CSS Bootstrap CSS3 HTML5 TypeScript Vue.js Angular Svelte GraphQL Apollo Client Styled Components Jest Cypress

🚀 Backend Technologies

Architecting Robust and Scalable Backends

In the backend domain, I excel in building highly scalable, secure, and efficient server-side applications. My work ensures seamless data flow, robust API integrations, and secure data management. I leverage microservices architecture, serverless computing, and cloud-native solutions to build resilient and scalable backend systems.

  • Node.js
  • Express.js
  • Laravel
  • Python
  • Go
  • Rust
  • Java
  • Spring Boot
  • Ruby on Rails
  • PHP
  • Django
  • Flask
  • Koa.js
  • Hapi.js
  • FastAPI
  • GraphQL
  • Apollo Server
  • Firebase Functions
Node.js Express.js Laravel Python Go Rust Java Spring Boot Ruby on Rails PHP Django Flask Koa.js Hapi.js FastAPI GraphQL Apollo Server Firebase Functions

🗄️ Databases

Mastery in Data Management

Handling data with precision and ensuring optimal performance and security is a cornerstone of my work. I have extensive experience in both SQL and NoSQL databases, ensuring robust data models, efficient queries, and secure transactions.

  • MongoDB
  • Firebase
  • MySQL
  • PostgreSQL
  • SQLite
  • Redis
  • Cassandra
  • DynamoDB
  • Oracle Database
  • Microsoft SQL Server
MongoDB Firebase MySQL PostgreSQL SQLite Redis Cassandra DynamoDB Oracle Database Microsoft SQL Server

🛠️ Development Tools and Methodologies

A Comprehensive Arsenal for Development and Innovation

My toolkit is expansive, encompassing a wide range of tools and technologies that enable me to deliver cutting-edge solutions. From version control and containerization to continuous integration and deployment, I leverage the best tools to streamline development and ensure high-quality results.

  • Version Control: Git, SVN
  • Containerization: Docker, Kubernetes
  • CI/CD: Jenkins, Travis CI, CircleCI, GitHub Actions
  • Configuration Management: Ansible, Puppet, Chef
  • Virtualization: Vagrant, VMware, VirtualBox
  • Monitoring and Logging: ELK Stack, Prometheus, Grafana
  • APIs and Web Services: REST, GraphQL, gRPC, SOAP
  • Networking: TCP/IP, DNS, DHCP, Load Balancers, Firewalls
  • Cloud Platforms: AWS, Azure, Google Cloud, DigitalOcean, Heroku
  • Blockchain: Ethereum, Solidity, Hyperledger
  • AI and Machine Learning: TensorFlow, Keras, PyTorch, scikit-learn
  • Quantum Computing: Qiskit, Microsoft Quantum Development Kit
  • IoT: MQTT, CoAP, Zigbee, Z-Wave
Git SVN Docker Kubernetes Jenkins Travis CI CircleCI GitHub Actions Ansible Puppet Chef Vagrant VMware VirtualBox ELK Stack Prometheus Grafana REST GraphQL gRPC SOAP TCP/IP DNS DHCP Load Balancers Firewalls AWS Azure Google Cloud DigitalOcean Heroku Ethereum Solidity Hyperledger TensorFlow Keras PyTorch scikit-learn Qiskit Microsoft Quantum Development Kit MQTT CoAP Zigbee Z-Wave

🔒 Cybersecurity and Ethical Hacking

With an extensive background in cybersecurity, I have mastered various techniques and tools to protect, test, and secure systems. My experience spans from ethical hacking to advanced penetration testing and incident response, following industry standards and frameworks to ensure robust security.

Key Areas of Expertise:

  • Penetration Testing:

    • Conducting comprehensive penetration tests to identify vulnerabilities in networks, applications, and systems.
    • Tools: Metasploit, Burp Suite, OWASP ZAP, Nmap.
    • Frameworks: OWASP Testing Guide, PTES (Penetration Testing Execution Standard).
  • Network Security:

    • Configuring and securing network infrastructure with firewalls, IDS/IPS systems, and network monitoring tools.
    • Tools: Wireshark, Snort, Suricata.
    • Standards: NIST SP 800-53, ISO/IEC 27001.
  • Reverse Engineering:

    • Disassembling and analyzing software to understand its functionality and identify security flaws.
    • Tools: IDA Pro, Ghidra, x86/x64 Assembly.
    • Techniques: Static and dynamic analysis, decompilation.
  • Exploit Development:

    • Developing custom exploits for vulnerabilities in software and hardware.
    • Techniques: Buffer overflow, ROP (Return Oriented Programming), shellcoding.
    • Resources: Exploitation books such as "Hacking: The Art of Exploitation" and "The Shellcoder's Handbook".
  • Web Application Security:

    • Securing web applications through code reviews, vulnerability assessments, and implementing best practices.
    • Vulnerabilities: SQL injection, XSS, CSRF, and more.
    • Standards: OWASP Top Ten, ASVS (Application Security Verification Standard).
  • Incident Response:

    • Handling security incidents, conducting forensic analysis, and mitigating threats.
    • Tools: SIEM (Security Information and Event Management) systems, log analysis tools.
    • Frameworks: NIST Computer Security Incident Handling Guide, ISO/IEC 27035.
  • Advanced Persistent Threats (APT):

    • Detecting and defending against sophisticated and prolonged cyber-attacks.
    • Techniques: Persistent backdoors, rootkits, advanced evasion techniques.
    • Standards: MITRE ATT&CK framework, Cyber Kill Chain.
  • Shadow Operations:

    • Involved in covert operations on platforms like mirror-h and golgeler, contributing to understanding the tactics and techniques used by adversaries.
    • Experience: Engaging in real-world cyber operations to gain insights into adversarial behavior and techniques.
  • Security Automation:

    • Developing scripts and tools for automating security tasks and improving efficiency.
    • Languages: Python, Bash, PowerShell.
    • Automation Tools: Ansible, Puppet, Chef.
  • Cryptography:

    • Implementing and analyzing encryption algorithms and secure communication protocols.
    • Algorithms: RSA, AES, hashing algorithms.
    • Standards: FIPS 140-2, ISO/IEC 19790.
  • Social Engineering:

    • Conducting social engineering assessments to identify human vulnerabilities and strengthen organizational security awareness.
    • Techniques: Phishing, pretexting, baiting.
  • Red Teaming:

    • Conducting comprehensive red team assessments to simulate real-world attacks and test the effectiveness of security measures.
    • Standards: Red Team Operations framework, NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment).

Certifications and Standards:

  • Certifications:

  • In Progress

    • Certified Information Systems Security Professional (CISSP)
    • Offensive Security Certified Professional (OSCP)
    • Certified Ethical Hacker (CEH)
    • GIAC Penetration Tester (GPEN)
  • Standards:

    • ISO/IEC 27001: Information Security Management
    • NIST Cybersecurity Framework
    • GDPR: General Data Protection Regulation

My cybersecurity expertise ensures robust protection for any project I undertake, making systems resilient against both common and sophisticated threats. My knowledge of industry standards and frameworks allows me to align security practices with the highest benchmarks, ensuring comprehensive protection and compliance.

A Guardian of the Digital Realm

My deep expertise in cybersecurity and ethical hacking ensures the integrity, confidentiality, and availability of systems and data. From penetration testing to implementing advanced security measures, I safeguard digital assets with precision and diligence.

  • Penetration Testing: Metasploit, Burp Suite, OWASP ZAP, Nessus
  • Network Security: Nmap, Wireshark, Snort, Suricata
  • Cryptography: RSA, AES, SHA, PGP, GPG
  • Forensics: Volatility, Autopsy, Sleuth Kit
  • Reverse Engineering: IDA Pro, Ghidra, Radare2, Binary Ninja
  • Incident Response: SIEM, SOAR, Splunk, ELK Stack
  • Social Engineering: SET, Maltego, BeEF
  • Anonymity and Privacy: Tor, I2P, VPNs
  • Exploitation: Custom Exploits, Buffer Overflows, SQL Injection, XSS, CSRF

🖥️ Operating Systems

Proficiency Across All Major Operating Systems

I have extensive experience with various operating systems, ensuring seamless integration and deployment across platforms. My expertise spans from traditional UNIX-like systems to modern cloud-based environments, providing a solid foundation for diverse technological ecosystems.

  • Linux: Rocky Linux, CentOS, Red Hat Enterprise Linux (RHEL), Ubuntu, Arch Linux
  • macOS
  • Windows
  • Unix: FreeBSD, OpenBSD, NetBSD
  • Embedded OS: Yocto, Zephyr, FreeRTOS
Rocky Linux CentOS Red Hat Enterprise Linux (RHEL) macOS Ubuntu Arch Linux Windows FreeBSD OpenBSD NetBSD Yocto Zephyr FreeRTOS

📚 Additional Expertise

An Endless Pursuit of Knowledge and Excellence

My commitment to continuous learning and improvement has led me to explore a wide array of technologies and methodologies. I stay at the forefront of industry advancements, ensuring my skills remain sharp and relevant in an ever-evolving landscape.

  • DevOps: Infrastructure as Code (IaC), Continuous Integration/Continuous Deployment (CI/CD), Automated Testing, Monitoring and Logging
  • Cloud Architecture: Multi-Cloud Strategies, Hybrid Cloud, Cloud Migration, Cloud-Native Development
  • Big Data: Hadoop, Spark, Kafka, Flink, NoSQL, Data Lakes, Data Warehousing
  • AI/ML: Deep Learning, Natural Language Processing (NLP), Computer Vision, Reinforcement Learning
  • Quantum Computing: Quantum Algorithms, Quantum Cryptography, Quantum Machine Learning
  • Blockchain: Smart Contracts, Decentralized Applications (DApps), Consensus Algorithms
  • AR/VR: Augmented Reality, Virtual Reality, Mixed Reality, Unity, Unreal Engine
  • Mobile Development: Android, iOS, Cross-Platform Solutions (Flutter, React Native)
  • Microservices: Service Mesh, API Gateway, Circuit Breaker Pattern
  • SEO: Sitemaps, OpenGraph, Google Video Sitemaps, Schema Markup, Rich Snippets, Keyword Optimization
  • Technical SEO and Performance Optimization: Proven ability to develop highly optimized web applications utilizing advanced SEO techniques including sitemaps, Open Graph protocol, Google Video Sitemap, SCHEMA markup, and JSON-LD structured data for superior search engine visibility and organic traffic acquisition.
Ansible Terraform Docker Kubernetes AWS Azure Google Cloud Spark Hadoop Kafka Scala Ethereum Solidity Unity Unreal Engine Flutter Android iOS React Native

*https://uruskan.itch.io/planet


Pinned Loading

  1. droneStuff droneStuff Public

    Otonom IHA geliştirme projesi için yapmış olduğum çalışmalar.

    Python 4 1

  2. unityStuff unityStuff Public

    Unity oyun motoru için yazılmış C# scriptleri.

    C# 2

  3. FKMEventApp FKMEventApp Public

    Fethiye Belediyesi Kültür merkezi için yaptığım mobil uygulama.

    Java 3

  4. smallWebProjects smallWebProjects Public

    Projects that I deem too small to create their own repos for, HTML/CSS and Javascript.

    HTML 3

  5. Next-Tube Next-Tube Public

    Modern Video Tube made with Next.Js. It has database and everything.

    JavaScript 11

  6. Glorified-Panel Glorified-Panel Public

    Security first linux server monitoring and management panel.

    JavaScript 2