Yavuz S. G.
Full-Stack Developer
Since my early years, I have been interested in technology systems, and before starting my professional career, I acquired the knowledge of an average software developer. During this process, I developed my skills in the fields of Web, Network, Embedded, and Cyber Security. One of my main goals is to become a fully equipped software developer.
Network
Embedded & DAD
Web
Struct
DataBase
Repositories
...
Followers
...
Stars
...
Solved Algorithm
Gists
...
Ideology
Providing effective solutions to problems through technology and offering them as open source. Offering
alternatives to existing systems (thereby helping to prevent monopolization). Working on networking and
embedded systems in general. Publishing informative articles and discussions that are open to the community.
Experience
-
MağaraJam Competition
I developed a game called "Mysterious Box" with the Unity game engine as part of a team. I took on the roles of designer and software developer in the team. Despite it being our first time developing a game as a team, we achieved a good ranking in the competition.
-
Sakarya Gençtek Meeting
We were asked to come up with a solution to the problem given in the competition using Arduino Uno. We participated in this tournament as a team of eight and won first place with our invention receiving the most acceptance.
-
Sakarya Belediyesi Game Developing Competition
We were asked to create a simulation game focused on solving municipal problems in specific categories. As a team of three, we chose the Unity game engine to develop the game. The game would be in 2D style. In addition, we tried to add as many effective elements as possible to the game world throughout the entire period, as time allowed. As a software developer, I had a lot of fun working with the team during this three-day process.
-
Sakarya Belediyesi Hacker/Cyber Security Competition
Depending on the platform provided in the competition, we were asked to break into a system with eight vulnerabilities and find the flag from the vulnerable system within the scope of CTF. Some of the categories were: XSS, SQL Injection...
We develop solution-oriented programs with the pretense of low-level programming.
Explore Organization