Skip to content
View pragyaasapkota's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro

Block or report pragyaasapkota

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
pragyaasapkota/README.md

Hello There 👋 I'm Pragya Sapkota 👨‍💻

Under the hood

  • 🌱 I’m currently learning Backend Development👨‍💻.
  • 🤔 I’m looking for help - if someone wishes to guide me. 🤙.
  • 💬 Ask me about anything, I am happy😁 to help👯.
  • 📝 Writings: I am also a professional technical content writer. ✍️ You can view some of my content in my Portfolio repository. And if you're interested in the official blog, I have one on Medium as Pragya Sapkota. You can CTRL+click the link and browse through my articles.
  • 😄 Nickname: Wight 🙈

Where to reach me:

Tech & Tools Preference

HTML5 CSS3 JavaScript C & C++ Git Github VsCode Wordpress

Don't forget to check the Repositories and give a star🤝.

Pinned Loading

  1. System-Design-Concepts System-Design-Concepts Public

    Though the concepts of system design might be tricky, let's see them individually to their core concepts and have a better understanding.

    51 16

  2. Attack-Vectors-Breakdown Attack-Vectors-Breakdown Public

    Detailed breakdown of major cybersecurity attack vectors — phishing, SQLi, XSS, ransomware, zero-day exploits, and social engineering — with examples and defenses.