Skip to content
View jesuscbm's full-sized avatar
🎓
Student
🎓
Student
  • Albacete - Madrid

Block or report jesuscbm

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jesuscbm/README.md

Hello there! 👋

💫 About Me:

UAM Logo 🎓 Computer Science & Mathematics Double Major at Universidad Autónoma de Madrid.

Passionate about Systems Programming, Cybersecurity, and Mathematics. This profile hosts my technical projects, experiments with low-level languages, and open source contributions.

📝 Projects:

Selected repositories:

  • Dos Workshop - Network traffic analysis and controlled DoS stress testing lab.
  • CPPaste - Custom HTTP API in C++17, used to implement a PasteBin-like website.
  • C & SDL3 Projects:
  • Dotfiles - My personal Arch Linux configuration, scripts, and workflow tools.
  • Super Palo Bros - 2D platformer game developed in Lua.
  • Personal Website - Portfolio.

🔢 Languages:

C C++ Python Bash Lua Java HTML CSS JS

🛠️ Tools & Technologies:

Linux Neovim Vim Git TeX SDL Postgres

🌱 Interests:

  • 👾 Systems Programming (C)
  • 📡 Networking & Protocols
  • 📺 Cybersecurity
  • 📐 Applied Mathematics

🎯 Goals:

  • 🤓 Deepening knowledge in Kernel & Security
  • 👯 Contributing to technical Open Source projects

🌐 Socials:

email

Pinned Loading

  1. dotfiles dotfiles Public

    Where I store my configuration files for diverse apps

    Shell 8

  2. asteroid-like asteroid-like Public

    Game like the classic Asteroid

    C

  3. sorting_visualizer sorting_visualizer Public

    Visualizer for sorting algorithms, written in C with SDL3

    C

  4. dos-workshop dos-workshop Public

    Files for an activity where attendants try to take down a server with multiple vulnerable endpoints, using one (or more) bots in the process.

    Typst 1