Kurs programowania języka Java od podstaw
☆44Aug 17, 2022Updated 3 years ago
Alternatives and similar repositories for KursJava
Users that are interested in KursJava are comparing it to the libraries listed below
Sorting:
- ☆14May 29, 2020Updated 5 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- Przygotowanie i wysyłka plików JPK☆12Feb 19, 2019Updated 7 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- ☆12Feb 13, 2026Updated 2 weeks ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Real-time face-recognition program. Have fun with OpenCV-python.☆12Feb 26, 2021Updated 5 years ago
- #OSINT - Search username on socials☆12Feb 11, 2020Updated 6 years ago
- Tool for Reconnaissance on a web camera.☆18Apr 5, 2022Updated 3 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- A boilerplate for new Serverless Nodejs projects with tests and basic configurations☆14Jan 9, 2023Updated 3 years ago
- Stuff from the University of Wrocław☆11Mar 7, 2023Updated 2 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Google chrome extensions downloader coded in python☆15Dec 7, 2018Updated 7 years ago
- A django-otp plugin that verifies YubiKey OTP tokens.☆13Jan 7, 2026Updated last month
- Monitor internet facing resource for open ports #Blueteam☆14Apr 7, 2020Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆21Feb 20, 2014Updated 12 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- List of possible Linux backdoors☆15Aug 7, 2020Updated 5 years ago
- Network-Based Malware Detection using Natural Language Processing☆14May 10, 2021Updated 4 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Dec 5, 2018Updated 7 years ago
- Hide your Django site behind basic authentication with IP whitelisting support☆17Mar 10, 2025Updated 11 months ago
- Blue Team Powershell Script☆18Nov 22, 2021Updated 4 years ago
- Nqntnqnqmb transform maltego☆24Sep 19, 2020Updated 5 years ago
- Basic Snyk CLI plugin for Python support☆20Updated this week
- ☆20Sep 16, 2021Updated 4 years ago
- JWT Best Practices React app w/ Express API Server☆18May 16, 2022Updated 3 years ago
- 🔥 Everything awesome about web-application firewalls (WAF).☆17Jul 27, 2019Updated 6 years ago
- A simple port scanner, written in C☆17Oct 25, 2018Updated 7 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago