Skip to content
View heshanthenura's full-sized avatar

Block or report heshanthenura

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
heshanthenura/README.md

Hey there, I'm Heshan Thenura Kariyawasam
🌱Based in Sri Lanka 🇱🇰

heshanthenura@github:~$ cat aboutme.txt

self-taught developer
currently pursuing BSc (Hons) in Information Technology specialising in Cyber Security at SLIIT

# Download my CV with curl
curl -O https://github.com/heshanthenura/heshanthenura/blob/main/assets/CV-Heshan_Kariyawasam.pdf

📄 My CV

🛠️ Tech Stack & Tools I Use

JavaSpring BootJavaFXNimGoJuliaPythonTypeScriptGDScriptGodot EngineSQLReactReact NativeAngularGitHubLinuxESP32FirebaseVercelOracle Cloud

🤙 Let's Connect & Collaborate

I'm always open to ideas, collabs, or just a good tech convo. Whether you're building something cool, learning something new, or just exploring the world of code, reach out. Let’s build, break, fix, and learn together.

Pinned Loading

  1. sentrigoV2 sentrigoV2 Public

    SentriGOV2 is a real time network monitoring and intrusion prevention platform focused on visibility, simplicity, and performance.

    C 1

  2. lightlogger lightlogger Public

    LightLogger is a lightweight log collection and monitoring platform built for startups, small teams, and internal systems that want visibility into logs without complex or expensive tools.

    TypeScript 2 1

  3. SentriGo SentriGo Public

    Lightweight Intrusion Detection System (IDS)

    Go 5

  4. Fennec Fennec Public

    Fennec Command and Control (C2) framework with three components: a victim agent, a server, and a control app. The victim connects to the server, and the control app manages the victim through the s…

    Nim 5