RajatSingh08 / geekjudgeLinks
Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.
☆14Updated 2 years ago
Alternatives and similar repositories for geekjudge
Users that are interested in geekjudge are comparing it to the libraries listed below
Sorting:
- This repo contains all SQL Queries of the Basic Database Management Course of Coding Ninjas.☆31Updated last year
- A Ransomware Based in AES256 Algorithm☆17Updated 3 years ago
- Curated list of ransomware-related resources; awesome style.☆26Updated 11 months ago
- Solution to SIH 22 problem statement Smart Attendance☆10Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- All Type Of Tools written in multipule language .☆22Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- ☆18Updated 6 months ago
- Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & …☆16Updated 5 years ago
- Ransomware for demonstration☆18Updated 2 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Trojan written in C++ for Windows☆20Updated last year
- python keylogger and spying malware .☆15Updated 8 months ago
- CTF problems for the practice of Beginners in Cyber Forensics.☆36Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆20Updated 2 years ago
- Open-source antivirus project.☆31Updated 9 years ago
- This repository includes academic notes, study materials, and resources from B.Tech (Hons) in CSE, specializing in Artificial Intelligenc…☆44Updated last week
- ALL Subject of Notes that are asked in GATE☆23Updated 6 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Hacking-Beginner-to-Expert-Guide-by-James-Patterson☆18Updated 4 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Updated last year
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Updated 4 years ago
- Steganography app for Android☆40Updated 4 years ago
- This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!☆13Updated 4 years ago
- Spider or repeater to find all links.☆10Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated 2 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆24Updated 4 years ago