Amrita-TIFAC-Cyber-Blockchain / 2025_20CYS402-Distributed-Systems-and-Cloud-ComputingLinks
20CYS402 - Distributed Systems and Cloud Computing - 7th Sem - B.Tech. CSE (CYS) - ASC, CBE
☆15Updated this week
Alternatives and similar repositories for 2025_20CYS402-Distributed-Systems-and-Cloud-Computing
Users that are interested in 2025_20CYS402-Distributed-Systems-and-Cloud-Computing are comparing it to the libraries listed below
Sorting:
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆61Updated last year
- WiFi Penetration Testing Guide☆570Updated last year
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆609Updated 4 months ago
- notes☆156Updated last month
- a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM☆805Updated last year
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆13Updated last month
- 100 days of cybersecurity - join Discord and connect with us to know more on this challenge #100daysofcybersecurity #sector21☆186Updated 4 months ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆57Updated 4 months ago
- a list of 390+ Free TryHackMe rooms to start learning cybersecurity with THM☆961Updated last month
- Study Guide for CEH v10 exam☆300Updated 4 years ago
- List of tools and commands that may be helpful in CTFs☆237Updated last year
- It is a advanced keylogger.☆56Updated last year
- Basic tool for Information Gathering 🚀☆12Updated last year
- Complete Listing and Usage of Tools used for Ethical Hacking☆1,831Updated last year
- This is a repository for all the writeups of CTFs organized by us.☆18Updated 5 months ago
- ☆22Updated 2 weeks ago
- Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user di…☆987Updated 7 months ago
- ☆54Updated last year
- Kali for Penetration Testers, by EC-Council☆12Updated 2 years ago
- An inventory system built using TASM assembly language.☆9Updated last year
- Certified Ethical Hacker (CEH) v12 Notes☆284Updated 3 months ago
- ☆25Updated 2 years ago
- ☆294Updated 3 years ago
- My notes and solutions for the missions on HackThisSite.org.☆34Updated 5 years ago
- Roadmap for Web Application Penetration Testing | FREE Resources (Not Pirated)☆328Updated last year
- Getting Target Browser information by using a URL☆35Updated 8 months ago
- This repository contains all the source code for the various writeups I have written over time of all the Olicyber editions I have partic…☆23Updated 2 months ago
- Hello, aspiring hackers! 🕵️♂️ Here’s a list of 500+ Free TryHackMe rooms to kickstart your cybersecurity journey. These rooms are absol…☆137Updated this week
- In this repository you will find many cyber security related books and content that is scattered in the internet.☆23Updated 2 years ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,087Updated last year