My notes & solutions for CS50x 2022-2023.
☆128Jul 19, 2023Updated 2 years ago
Alternatives and similar repositories for CS50x
Users that are interested in CS50x are comparing it to the libraries listed below
Sorting:
- CS50's Introduction to Computer Science - 2023 Solutions☆10Nov 8, 2023Updated 2 years ago
- College Admission System website☆10May 12, 2021Updated 4 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- This is CS50x , Harvard University's introduction to the intellectual enterprises of computer science and the art of programming for majo…☆36Sep 2, 2023Updated 2 years ago
- An E-Commerce Store selling Computer parts and accessories built with proper implementation of MySQL as a database and PHP as the back-en…☆11Sep 11, 2023Updated 2 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- Low level design questions☆12May 6, 2025Updated 10 months ago
- This repository includes all the solutions of Leetcode challenges☆10Nov 29, 2021Updated 4 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- Hacking-Beginner-to-Expert-Guide-by-James-Patterson☆18Mar 27, 2021Updated 4 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆17Apr 10, 2022Updated 3 years ago
- ☆16Sep 27, 2025Updated 5 months ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- ☆15Jul 3, 2023Updated 2 years ago
- This program is used to steal passwords on Google Chrome very easily with a message on a webhook discord.☆10Aug 11, 2021Updated 4 years ago
- Automation Script to Attend Zoom Classes while Sleeping☆11Oct 18, 2020Updated 5 years ago
- Don't buy, adopt! Pet Adoption is a small application built with React.js, next.js, React Hooks, Apollo, GraphQL, styled-components and p…☆13Jan 14, 2019Updated 7 years ago
- Collection of cybersecurity and ethical hacking roadmaps from beginner to advanced, curated by CYBER MIND SPACE.☆45Jun 20, 2025Updated 8 months ago
- This is some of my Python technical books collection☆13Sep 26, 2013Updated 12 years ago
- Wanna TesT YoUr CyberSecurity Skills Below are the amazing platforms to level-up yourself☆19Jun 4, 2022Updated 3 years ago
- Design Pattern Playlist - code and notes☆11Aug 18, 2023Updated 2 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- ☆11Sep 5, 2021Updated 4 years ago
- Website dedicated to all things R and Databases☆15Sep 7, 2022Updated 3 years ago
- A program to check the security of personal passwords.☆12Jul 19, 2022Updated 3 years ago
- This is the official website for Students Association of Computer Science, an organization functioning in NSS College of Engineering☆14Jan 26, 2023Updated 3 years ago
- The Ranflood ransomware contrast tool☆17Dec 18, 2024Updated last year
- Image Reading, writing, histogram, histogram equalization, local histogram equalization, low pass filter, high pass filter, geometrical t…☆12Mar 31, 2020Updated 5 years ago
- Some useful websites for programmers.☆11Jun 7, 2017Updated 8 years ago
- Solutions 📕 to coursera Course Natural Language Procesing with Probabilistic Models part of the Natural Language Processing 👨💻 Specia…☆12Nov 14, 2020Updated 5 years ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- 🟣 Backtracking Algorithms interview questions and answers to help you prepare for your next data structures and algorithms interview in …☆14Jan 4, 2026Updated 2 months ago