Skip to content
View xMohammadAsimx's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report xMohammadAsimx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
xMohammadAsimx/README.md

Hi , I'm Mohammad Asim

Typing SVG

Typing SVG


πŸ™‹β€β™‚οΈ π™°πš‹πš˜πšžπš π™ΌπšŽ

  • 𝙼.πš‚πšŒ πš’πš— π™²πš’πš‹πšŽπš›πšœπšŽπšŒπšžπš›πš’πšπš’ | π™·πšŠπš–πšŠπš π™±πš’πš— π™Ίπš‘πšŠπš•πš’πšπšŠ πš„πš—πš’πšŸπšŽπš›πšœπš’πšπš’, πš€πšŠπšπšŠπš›
  • 𝙱.πš‚πšŒ πš’πš— π™²πš˜πš–πš™πšžπšπšŽπš› π™΄πš—πšπš’πš—πšŽπšŽπš›πš’πš—πš | π™²π™Ύπ™Όπš‚π™°πšƒπš‚ πš„πš—πš’πšŸπšŽπš›πšœπš’πšπš’ π™Έπšœπš•πšŠπš–πšŠπš‹πšŠπš, π™ΏπšŠπš”πš’πšœπšπšŠπš—
  • π™ΏπšŠπšœπšœπš’πš˜πš—πšŠπšπšŽ πšŠπš‹πš˜πšžπš π™°πš›πšπš’πšπš’πšŒπš’πšŠπš• π™Έπš—πšπšŽπš•πš•πš’πšπšŽπš—πšŒπšŽ, π™²πš’πš‹πšŽπš›πšœπšŽπšŒπšžπš›πš’πšπš’, πšŠπš—πš 𝙸oπšƒ
  • π™²πš˜πš—πšπšžπšŒπšπš’πš—πš πš›πšŽπšœπšŽπšŠπš›πšŒπš‘ πš’πš— π™²πš’πš‹πšŽπš›πšœπšŽπšŒπšžπš›πš’πšπš’, π™°πš›πšπš’πšπš’πšŒπš’πšŠπš• π™Έπš—πšπšŽπš•πš•πš’πšπšŽπš—πšŒπšŽ, πšŠπš—πš πšπšŠπšπš’πš˜ π™΅πš›πšŽπššπšžπšŽπš—πšŒπš’ π™΅πš’πš—πšπšŽπš›πš™πš›πš’πš—πšπš’πš—πš

πŸ› οΈ πšƒπšŽπšŒπš‘ πš‚πšπšŠπšŒπš” & πšƒπš˜πš˜πš•πšœ


πŸ† π™°πšŒπš‘πš’πšŽπšŸπšŽπš–πšŽπš—πšπšœ

  • π™²πšŠπš–πš™πšžπšœ π™Άπš˜πš•πš π™ΌπšŽπšπšŠπš• πš’πš— π™²πš˜πš–πš™πšžπšπšŽπš› π™΄πš—πšπš’πš—πšŽπšŽπš›πš’πš—πš π™±πšŠπšπšŒπš‘ (π™΅πšŠπš•πš• 2020).
  • π™΅πšˆπ™Ώ 𝚠𝚊𝚜 πšœπš‘πš˜πš›πšπš•πš’πšœπšπšŽπš πšŠπš–πš˜πš—πš πšπš‘πšŽ πšƒπš˜πš™ 10 π™Ώπš›πš˜πš“πšŽπšŒπšπšœ 𝚊𝚝 πšπš‘πšŽ π™²π™Ύπ™Όπš‚π™°πšƒπš‚ π™Ώπš›πš˜πš“πšŽπšŒπš & π™²πšŠπš›πšŽπšŽπš› π™΄πš‘πš™πš˜ 2024.
  • πš‚πšŽπšŒπšžπš›πšŽπš πšπšžπš—πšπš’πš—πš πšπš˜πš› πšπš‘πšŽ π™΅πš’πš—πšŠπš• πšˆπšŽπšŠπš› π™Ώπš›πš˜πš“πšŽπšŒπš (𝙱.πš‚πšŒ) πšπš›πš˜πš– π™ΏπšŠπš”πš’πšœπšπšŠπš— π™΄πš—πšπš’πš—πšŽπšŽπš›πš’πš—πš π™²πš˜πšžπš—πšŒπš’πš• (𝙿𝙴𝙲).
  • πš‚πšŽπšŒπšžπš›πšŽπš πšπšžπš—πšπš’πš—πš πšπš˜πš› πšπš‘πšŽ π™΅πš’πš—πšŠπš• πšˆπšŽπšŠπš› π™Ώπš›πš˜πš“πšŽπšŒπš (𝙱.πš‚πšŒ) πšπš›πš˜πš– π™Έπšπš—πš’πšπšŽ'𝚜 π™½πšŠπšπš’πš˜πš—πšŠπš• π™Άπš›πšŠπšœπšœπš›πš˜πš˜πšπšœ π™Έπ™²πšƒ πšπšŽπšœπšŽπšŠπš›πšŒπš‘ π™Έπš—πš’πšπš’πšŠπšπš’πšŸπšŽ (π™½π™Άπ™Έπšπ™Έ).
  • πšπšŽπšŒπšŽπš’πšŸπšŽπš 𝚊 π™ΌπšŽπš›πš’πš π™²πšŽπš›πšπš’πšπš’πšŒπšŠπšπšŽ πšπš˜πš› 1𝚜𝚝 πš™πš˜πšœπš’πšπš’πš˜πš— πš’πš— π™²πš˜πš–πš™πšžπšπšŽπš› π™΄πš—πšπš’πš—πšŽπšŽπš›πš’πš—πš π™±πšŠπšπšŒπš‘ (5πšπš‘, 6πšπš‘ & 7πšπš‘ πš‚πšŽπš–πšŽπšœπšπšŽπš›).
  • π™°πš πšŠπš›πšπšŽπš 𝚊 πš•πšŠπš™πšπš˜πš™ πšπš‘πš›πš˜πšžπšπš‘ πšπš‘πšŽ π™Ώπš›πš’πš–πšŽ π™Όπš’πš—πš’πšœπšπšŽπš› π™»πšŠπš™πšπš˜πš™ πš‚πšŒπš‘πšŽπš–πšŽ 2023.

πŸ“ˆ π™Άπš’πšπ™·πšžπš‹ πš‚πšπšŠπšπšœ


πŸ”— π™»πšŽπš'𝚜 π™²πš˜πš—πš—πšŽπšŒπš


Popular repositories Loading

  1. Wi-Fi-Security Wi-Fi-Security Public

    This Project explores the evolution of Wi-Fi security protocols from WEP to WPA3, focusing on cryptographic weaknesses, vulnerabilities, and practical attack scenarios. It includes a detailed analy…

    2 1

  2. xMohammadAsimx xMohammadAsimx Public

  3. RedBlue-Enterprise-Lab RedBlue-Enterprise-Lab Public

  4. csi-key-generation csi-key-generation Public

    Analyzing wireless channel reciprocity and generating secret keys using Channel State Information (CSI)

    Jupyter Notebook

  5. Cybersecurity-Risk-Assessment-MSHS Cybersecurity-Risk-Assessment-MSHS Public

    Academic project demonstrating a FAIR-based cybersecurity risk assessment for a simulated healthcare organization.

  6. huffman-coding-matlab huffman-coding-matlab Public

    Implementation of Huffman coding and decoding in MATLAB

    MATLAB