Skip to content
View Arad-Afzali's full-sized avatar

Highlights

  • Pro

Block or report Arad-Afzali

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. AES-File-Encryptor-Decryptor AES-File-Encryptor-Decryptor Public

    AES-File-Encryptor is a Python-based application that provides a user-friendly graphical interface for encrypting and decrypting files or texts using the Advanced Encryption Standard (AES). This to…

    Python 3

  2. Nura-Bank Nura-Bank Public

    Nura bank is a neo bank that offers digital banking services. Unlike traditional banks, Nura bank does not have physical branches or ATMs. Instead, customers can access their accounts, make payment…

    HTML 6 5

  3. Personal-Website Personal-Website Public

    This is the code for my personal website that I have created using HTML,SCSS, CSS and JavaScript. It contains information about my background, skills and contact details. I have uploaded it on GitH…

    HTML 1

  4. Self-Hosted-Cloud-Storage Self-Hosted-Cloud-Storage Public

    Self Hosted Cloud Storage system using Django as backend

    JavaScript 2

  5. secure-messaging-client-side secure-messaging-client-side Public

    Secure Chat Client is a Python-based application designed for encrypted end-to-end messaging. It connects to a secure chat server, exchanges RSA public keys, and ensures secure communication throug…

    Python 2 1

  6. DDoS-attacks-detection DDoS-attacks-detection Public

    Forked from POOYASP2/DDoS-attacks-detection

    Developed for the ML4N course at Politecnico di Torino, this project implements a Machine Learning pipeline to detect and characterize DDoS attacks using both supervised and unsupervised learning t…

    Jupyter Notebook