aw-junaid / Computer-ScienceLinks
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies. Ideal for learners and enthusiasts looking to enhance their knowledge and skills in the field
☆56Updated 3 months ago
Alternatives and similar repositories for Computer-Science
Users that are interested in Computer-Science are comparing it to the libraries listed below
Sorting:
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆574Updated 3 months ago
- My personal research on quantum mechanics and quantum computing.☆10Updated 2 months ago
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆29Updated 3 months ago
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆28Updated last month
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆170Updated last year
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆264Updated 4 months ago
- tool used to change your IP every second your want☆291Updated 11 months ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆303Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆31Updated this week
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆29Updated 4 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆316Updated last week
- Redirect All Traffic Through Tor Network For Kali Linux☆191Updated 3 months ago
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆22Updated last month
- Passlord is a smart tool that creates lists of possible passwords using clever methods.☆25Updated 3 weeks ago
- Hackcctv☆182Updated last month
- ☆185Updated 4 months ago
- Steganography Detection Framework☆12Updated 5 months ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆247Updated last year
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆438Updated 11 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆201Updated 3 months ago
- Bash For Ethical Hacking☆63Updated 2 years ago
- Hacx GPT a powerful, evil brother of WormGPT.☆313Updated 2 weeks ago
- "Essential Kali Linux commands for ethical hackers and penetration testers."☆95Updated last year
- Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device re…☆16Updated 2 months ago
- EthicalHacking, Python, Nmap, Metasploit☆148Updated 4 years ago
- Acunetix Premium v24.10.241106172 | Linux☆33Updated 6 months ago
- Kali for Penetration Testers, by EC-Council☆12Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆314Updated 2 months ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆308Updated 7 months ago