Community support, daily live sessions, and thousands of builders — all in one place.
A browser-based self-driving car simulation built with JavaScript
It uses a feed-forward neural network and genetic mutation to train cars to drive autonomously on a road with dummy traffic.
Xonix-Game created in cpp using SFML
Single-player and Two-player mode available for competitive fun
A basic Unix-like shell built from scratch using C++. This shell mimics some common shell behaviors like executing commands, handling built-in commands (cd, help, exit), and more!
A fast, lightweight, and secure ZIP management tool built with wxWidgets
ArcLite is a desktop utility designed to simplify file compression and extraction. Built with C++ and wxWidgets, it offers a modern interface, efficient performance, and reliable ZIP handling without external dependencies. Whether you're managing large archives or quickly extracting a single file, ArcLite keeps the process simple, fast, and secure.
These are smaller side projects, experiments, or fun builds — not full-scale showcases, but still a glimpse into my curiosity.
The visual benchmarking tool converts program performance data into a JSON trace file, which can be loaded into chrome://tracing. Chrome Tracing then visualizes this data as interactive timelines, showing how functions execute over time. This helps identify performance bottlenecks
This repository contains code and configuration for building applications on the ESP32-S3 using the ESP-IDF framework.
This repository contains detailed writeups for various Capture The Flag (CTF) challenges I’ve solved. It covers categories like pwn, reverse engineering, web, crypto, and forensics. Each folder includes step-by-step solutions, explanations, and exploit scripts. The goal is to document learning and share techniques used in solving real challenges. More categories and writeups will be added as I continue exploring new CTFs.
I’m Bilal — a cybersecurity learner and developer obsessed with exploring how systems really work under the hood. My projects mix offense, defense, and design — from ROP exploits to building full-stack web apps.
When I’m not debugging binaries or experimenting with firmware, I’m probably tinkering with new ideas, building tools, or exploring ways to make cybersecurity learning more fun and hands-on.