☆22Aug 11, 2024Updated last year
Alternatives and similar repositories for safaksiz_egitim
Users that are interested in safaksiz_egitim are comparing it to the libraries listed below
Sorting:
- simple script to solve the problem of internet connection after ParrotOS-Anonsurf☆16Apr 2, 2022Updated 3 years ago
- Advanced professional graphical osint toolset with The Hive Remastered☆41Jul 3, 2024Updated last year
- iban üzerinden bilgi toplamak için işlemi basitleştiren basit python kodu☆12Apr 6, 2023Updated 2 years ago
- A simple python3 code to calculate the similarity ratio of people's voices & detect the same person☆20Sep 15, 2023Updated 2 years ago
- a script containing hacktools that make it easier to use for termux☆14Apr 23, 2022Updated 3 years ago
- Nmap Network Scanning Türkçe Dökümantasyonu☆43Mar 5, 2025Updated last year
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆13Nov 25, 2021Updated 4 years ago
- I share the solutions and scripts of the questions I like in the CTF I enter.☆18Feb 16, 2024Updated 2 years ago
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 11 months ago
- ☆10Mar 4, 2023Updated 3 years ago
- ☆10Jul 8, 2024Updated last year
- ☆10Feb 20, 2026Updated 2 weeks ago
- Repository where all the exercises of the object-oriented programming class are stored.☆10Jul 27, 2022Updated 3 years ago
- Temelden ileri seviyeye java projeleri☆10Jan 18, 2022Updated 4 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- ☆10Aug 14, 2023Updated 2 years ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆51Dec 11, 2021Updated 4 years ago
- Kali Linux Üzerinden İşlenen Linux Komut Satırı Dersleri Dokümantasyon Kaynağı☆334Aug 12, 2025Updated 6 months ago
- Windows Reverse TCP Shellcode ( 420 Bytes )☆21Feb 14, 2022Updated 4 years ago
- Wifi Adapter TxPower Tuner is a Python tool for Linux that adjusts wireless Tx-Power. It offers a user-friendly interface to set Tx-Power…☆11Feb 5, 2024Updated 2 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- Defalyzer is a cross-platform software that focuses on defacement analyzing and mirror tracking.☆14Mar 10, 2022Updated 3 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- This is the student management system designed for a small institute or coaching or a training center. It has been developed by JSP/Servl…☆19Oct 27, 2018Updated 7 years ago
- 📋 Guide to regular commit messages☆11Dec 24, 2024Updated last year
- ☆13Jun 14, 2024Updated last year
- ☆15Mar 1, 2026Updated last week
- ☆13Jan 19, 2023Updated 3 years ago
- ☆11Oct 20, 2019Updated 6 years ago
- Resources to accelerate deployment of bots to aide with an influx of COVID related questions☆16May 20, 2020Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Yazılım Terimleri Sözlüğü, yazılım geliştirme, bilgisayar bilimleri ve teknoloji dünyasına dair kapsamlı, güncel ve anlaşılır açıklamalar…☆77Jan 23, 2026Updated last month
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year