aw-junaid / Computer-Science
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies. Ideal for learners and enthusiasts looking to enhance their knowledge and skills in the field
☆52Updated last month
Alternatives and similar repositories for Computer-Science:
Users that are interested in Computer-Science are comparing it to the libraries listed below
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆531Updated 3 weeks ago
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆14Updated last month
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆21Updated last month
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆274Updated 10 months ago
- Ethical Hacking Tutorials , Pentesting Resources☆60Updated 6 years ago
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆28Updated 2 months ago
- Cybersecurity Resources☆281Updated 8 months ago
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆252Updated 2 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆184Updated 3 weeks ago
- it content free resources including courses that help you to learn ethical hacking for beginners to advanced☆51Updated 2 years ago
- Jailbreaking Grok to be your criminal advisor☆65Updated last month
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆418Updated last year
- Malware Development for Ethical Hackers, published by Packt☆305Updated 4 months ago
- "Essential Kali Linux commands for ethical hackers and penetration testers."☆88Updated last year
- Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great…☆167Updated last year
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆50Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆167Updated 10 months ago
- Top 100 Hacking & Security E-Books (Free Download)☆355Updated 4 years ago
- Study notes for the Certified Ethical Hacker v12.☆124Updated 11 months ago
- This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links th…☆398Updated 3 months ago
- ☆109Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆268Updated last year
- Getting Target Browser information by using a URL☆29Updated 4 months ago
- Certified Ethical Hacker (CEH) v12 Notes☆262Updated this week
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆48Updated this week
- Hackcctv☆164Updated 3 months ago
- Book collection☆144Updated 4 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆155Updated 6 months ago
- This study guide have some [practical labs] to test your knowledge and learn by doing.☆63Updated 2 years ago
- HackerGPT Cyber-Security Companion☆31Updated 4 months ago