Skip to content
View richfairhurst's full-sized avatar

Block or report richfairhurst

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
richfairhurst/README.md

Hello, folks! 👋

  • ⚡ My name is Rich Fairhurst
  • 💻 I'm trying hard to impersonate a cyber security professional
  • 👯 Currently based on the south coast of the UK.
  • 💬 Ask me Anything here! Im happy to help.
  • ⛰ If i’m not at a computer, i’m either in, or dreaming about, being underwater or in the mountains.


class RichFairhurst:

    def __init__(self):
        self.username = 'richfairhurst'
        self.name = 'Richard Fairhurst'
        self.web = 'https://www.richfairhurst.co.uk'
        self.twitter = '@richfairhurst'
        self.instagram = '@richfairhurst'
        self.linkedin = 'https://www.linkedin.com/in/richfairhurst/'
        self.email = 'rich[at]richfairhurst[dot]co[dot]uk'
        self.code = {
            'language': ['Python', 'Go', 'C#', 'Javascript'],
            'devops': ['Docker', 'AWS', 'GCloud', 'k8s' , 'Teraform', 'Ansible','GitHub Actions'],
            'frameworks': ['Django', 'Flask']
            'tools': ['GIT', 'GitHub', 'Pandas', 'Jupyter notebook','Bninja', 'IDA Pro', 'Pycharm', 'Frida'],
            'misc': ['GNU/Linux', 'Redis', 'Nginx' ]
        }
        self.architecture = ['x86', 'x64', 'arm']

    def __str__(self):
        return self.name


if __name__ == '__main__':
    me = RichFairhurst()

Popular repositories Loading

  1. cStalker cStalker Public

    Python

  2. Cheatsheets Cheatsheets Public

    Forked from dipsec/Cheatsheets-1

    Penetration Testing/Security Cheatsheets

  3. vulnserver vulnserver Public

    Forked from stephenbradshaw/vulnserver

    Vulnerable server used for learning software exploitation

    C

  4. MBE MBE Public

    Forked from RPISEC/MBE

    Course materials for Modern Binary Exploitation by RPISEC

    C

  5. InsecureProgramming InsecureProgramming Public

    Forked from deadbits/InsecureProgramming

    mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/

    C

  6. threatnote threatnote Public

    Forked from Blue-infosec/threatnote

    threatnote.io | Cyber Threat Intelligence Notebook

    JavaScript