0xnavarro / IA-PARA-TODOSView external linksLinks
El mayor repositorio de IA open source en Español del mundo.
☆17Jan 8, 2025Updated last year
Alternatives and similar repositories for IA-PARA-TODOS
Users that are interested in IA-PARA-TODOS are comparing it to the libraries listed below
Sorting:
- Flyer and Website for Monero Newbies☆13Nov 14, 2025Updated 3 months ago
- Herramienta para escanear toda la información previa y necesaria antes de llevar a cabo cualquier tipo de auditoría.☆13Jul 25, 2022Updated 3 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- SimpleX Chat theme repository☆11Oct 15, 2024Updated last year
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- Cyber Security Notes☆15Dec 11, 2025Updated 2 months ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 7 years ago
- Guillotine - Security Headers Finder HTTP☆13Apr 25, 2024Updated last year
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- ☆15Jan 4, 2022Updated 4 years ago
- Mi config personal de bspwm!☆16Nov 28, 2025Updated 2 months ago
- Chiasmodon Mobile - OSINT Tool for Domain Information Gathering on Android.☆25Apr 1, 2024Updated last year
- Basic Flask examples, written in Python3☆17Jan 14, 2021Updated 5 years ago
- Fake MySQL Server that attempts to steal files from clients.☆23Aug 5, 2020Updated 5 years ago
- ☆27Apr 12, 2024Updated last year
- Mobile client for Mostro p2p☆45Updated this week
- Instala configuración de @s4vitar,@vowkn y @kyb3rvizsla en dos clicks 😀☆22Jan 15, 2021Updated 5 years ago
- Script para automatizar la instalación y configuración de Nextcloud.☆25Feb 6, 2026Updated last week
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Jul 28, 2021Updated 4 years ago
- Document fingerprint generator☆30Jun 10, 2022Updated 3 years ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆35Jan 25, 2026Updated 3 weeks ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Jun 10, 2021Updated 4 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- This is a schematic for a cell phone jammer that works for the frequency band GSM 1900. It was part of my master's thesis at ITP/NYU. See…☆47Oct 21, 2014Updated 11 years ago
- Dump contents of an iOS device iTunes backup☆35Sep 29, 2021Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Jan 7, 2022Updated 4 years ago
- ☆37Jun 29, 2022Updated 3 years ago
- CIS Benchmark for RedHat Enterprise Linux 8☆42Mar 17, 2023Updated 2 years ago
- Shodan Port Scanner☆43Sep 30, 2020Updated 5 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Dec 13, 2022Updated 3 years ago
- Herramientas phishing todo en uno.☆43Apr 10, 2020Updated 5 years ago
- For CEH☆59Aug 15, 2019Updated 6 years ago
- Ruby wrapper gem for zoom.us API.☆52Jul 26, 2022Updated 3 years ago
- Sencilla Herramienta la cual usa 2 tipos de técnicas para Desconectar a dispositivos conectados a una red por tiempo ilimitado. Herramien…☆61Aug 25, 2023Updated 2 years ago
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 4 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Oct 17, 2025Updated 3 months ago
- ☆55Sep 22, 2021Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64May 18, 2021Updated 4 years ago
- Conjunto de manuales para reversa/analisis/cracking☆66Apr 28, 2022Updated 3 years ago