0x00Jeff / CaptainLinks
Captain Claw external hack
☆21Updated 3 years ago
Alternatives and similar repositories for Captain
Users that are interested in Captain are comparing it to the libraries listed below
Sorting:
- Collection of hacking tools, and ideas you might need to practice ethical hacking.☆30Updated 3 years ago
- some sources about net practice and networking, and everything i learned in this project☆11Updated 3 years ago
- All my solo learn course projects and certificates☆12Updated 2 years ago
- Cyber Odyssey 2024 : Qualifications Challenges.☆12Updated 9 months ago
- The “pool” is a 4-week immersion in the coding world. Just like a marathon runner, you will take a deep dive. Every day, weekends includ…☆29Updated 3 years ago
- This repository is an overview of what you need to learn in penetration testing.☆38Updated 2 years ago
- A custom shell program emulating basic bash functionalities☆38Updated 7 months ago
- ☆12Updated 2 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated 11 months ago
- A leak detector for your c project.☆26Updated 3 years ago
- Akasec's CTF Writeups archive☆13Updated 2 years ago
- 42 header for neovim made with lua☆11Updated 3 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆406Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆157Updated 2 years ago
- Ray tracing project for 42 school, Codam.☆32Updated 3 years ago
- linear algebra☆15Updated 2 years ago
- simple tester for push swap 42 project☆14Updated 3 years ago
- this is a set of test for ft_containers project☆58Updated 3 years ago
- tester for pipex project from 42 school☆17Updated 3 years ago
- A really good cybersec reading materials.☆13Updated 3 years ago
- Scripts generates files (.cpp , .hpp , Makefile…) for a c++ class designed in Orthodox Canonical Form.☆30Updated 2 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Updated 4 years ago
- ☆144Updated 6 months ago
- ☆14Updated last year
- Navigate through 42 projects with clarity and confidence☆32Updated 2 months ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆226Updated last year
- Reverse Engineering and Malware Analysis Roadmap☆410Updated 2 months ago
- 😎 A list of useful resources, links and more for @42School students.☆417Updated 8 months ago
- Solution implementation for HackerRank's Array-Subsets problem.☆10Updated 3 years ago
- Study materials for ethical hacking and cyber security☆68Updated 5 years ago