abhishivam1 / currency-converterrView external linksLinks
☆38Oct 7, 2023Updated 2 years ago
Alternatives and similar repositories for currency-converterr
Users that are interested in currency-converterr are comparing it to the libraries listed below
Sorting:
- ☆37Oct 6, 2023Updated 2 years ago
- Participate in Hacktoberfest by contributing to any Open Source project on GitHub! Here is a starter project for first time contributors.…☆38Oct 4, 2023Updated 2 years ago
- This is the hacktoberfest 2022 repository.☆38Oct 6, 2023Updated 2 years ago
- ☆39Oct 8, 2023Updated 2 years ago
- ☆38Oct 6, 2023Updated 2 years ago
- ☆38Oct 6, 2023Updated 2 years ago
- ☆38Sep 29, 2023Updated 2 years ago
- ☆39Oct 6, 2023Updated 2 years ago
- refer bot mde by reeshu for newbie☆38Sep 30, 2023Updated 2 years ago
- ☆40Mar 1, 2022Updated 3 years ago
- ☆38Aug 20, 2023Updated 2 years ago
- My Modding Site☆40Mar 29, 2022Updated 3 years ago
- ☆40Mar 25, 2023Updated 2 years ago
- ☆44Oct 23, 2025Updated 3 months ago
- yt downloader telegram bot☆27Sep 30, 2022Updated 3 years ago
- ☆30Feb 22, 2024Updated last year
- ☆29Feb 22, 2024Updated last year
- ☆28Nov 30, 2023Updated 2 years ago
- ☆29Feb 22, 2024Updated last year
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆98Feb 6, 2026Updated last week
- BSides Prishtina 2024 Malware Development and Persistence workshop☆123Jan 1, 2026Updated last month
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆280Jan 26, 2026Updated 3 weeks ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆291Feb 5, 2026Updated last week
- Automate installation of extra pentest tools on Kali Linux☆41Jan 4, 2021Updated 5 years ago
- SimpleEpub is a multi-threading windows application that converts a plain text file into an EPUB book. It extracts book name, author name…☆12Jun 5, 2025Updated 8 months ago
- MTfit code for Bayesian Moment Tensor Fitting☆86Jun 21, 2022Updated 3 years ago
- Cyper Pro Treasure Chest - Everything CyperPro☆23Nov 17, 2023Updated 2 years ago
- Track multiple Git repositories side-by-side☆11Apr 15, 2020Updated 5 years ago
- PyTorch implementation of "Learning to Discover Cross-Domain Relations with Generative Adversarial Networks"☆1,101Mar 26, 2018Updated 7 years ago
- A browser based code editor☆45,587Updated this week
- HARA: A Hierarchical Approach for Robust Rotation Averaging☆26Jan 8, 2023Updated 3 years ago
- Unit Testing with .NET Core ILogger<T>☆12Dec 8, 2023Updated 2 years ago
- pre-commit git hooks for Deno projects.☆11Jul 23, 2022Updated 3 years ago
- 😗 Easy to use route-based tool for building large-scale command-line interfaces☆16Aug 8, 2021Updated 4 years ago