Skip to content
View mhdtbc's full-sized avatar

Block or report mhdtbc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mhdtbc/README.md

πŸ‘‹ Hello there! I'm a telecom security consultant with 15+ years of experience in GSM, GPRS, LTE, VAS DPI, network fraud, and cybersecurity. I currently work as the Director of Solutions Architecture at Latro Services. 🏒

My expertise lies in developing innovative solutions to secure telecom networks and prevent fraud. πŸ”’ My passion for technology and its impact on society drives me to stay up-to-date with the latest trends and advancements in the field. πŸ’‘

When I'm not busy solving complex telecom security challenges, you can find me tinkering with new gadgets, exploring the outdoors, or sharing my knowledge with others in the industry. πŸŒ„πŸ“±πŸ’»

Feel free to explore my Github repositories to learn more about my work and projects. 🀝

Pinned Loading

  1. webuzo-acme webuzo-acme Public

    Script to automate ACME SSL Installation using Webuzo API (For hosters using Webuzo panel)

    Shell

  2. Malware-Detection-using-Deep-Learning Malware-Detection-using-Deep-Learning Public

    Forked from shayan-taheri/Malware-Detection-using-Deep-Learning

    Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malware files. Then, by the trained model, we try to classify a fi…

    Jupyter Notebook

  3. asn1tools asn1tools Public

    Forked from eerimoq/asn1tools

    ASN.1 parsing, encoding and decoding.

    Python

  4. Awesome-Hacking Awesome-Hacking Public

    Forked from misterch0c/Awesome-Hacking

    A collection of various awesome lists for hackers, pentesters and security researchers

  5. Cohort-Analysis-and-CLTV Cohort-Analysis-and-CLTV Public

    Forked from selenerc/Cohort-Analysis-and-CLTV

    Cohort analysis and customer lifetime value using online retail data set (Jupyter notebook workflow)

    Jupyter Notebook