aw-junaid / Computer-ScienceLinks
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies. Ideal for learners and enthusiasts looking to enhance their knowledge and skills in the field
☆57Updated 6 months ago
Alternatives and similar repositories for Computer-Science
Users that are interested in Computer-Science are comparing it to the libraries listed below
Sorting:
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆627Updated 6 months ago
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆44Updated 6 months ago
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆35Updated 4 months ago
- EthicalHacking, Python, Nmap, Metasploit☆177Updated 4 years ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆352Updated last year
- ☆377Updated last year
- ☆208Updated 7 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆73Updated last year
- E-books related to hacking helps you to know more about hacking☆211Updated 5 years ago
- Malware attacks/techniques explained☆186Updated 2 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆602Updated 2 months ago
- Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great…☆190Updated last year
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆27Updated 4 months ago
- ☆117Updated 2 years ago
- A curated collection of darknet resources for educational purposes, offering insights into darknet frameworks, tools, and security practi…☆87Updated 10 months ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆62Updated 5 months ago
- It is a advanced keylogger.☆61Updated last year
- Study notes for the Certified Ethical Hacker v12.☆132Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated 2 weeks ago
- Ethical Hacking Tutorials , Pentesting Resources☆70Updated 6 years ago
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆34Updated 7 months ago
- tool used to change your IP every second your want☆400Updated last year
- Hackcctv☆203Updated 4 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆538Updated this week
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆122Updated 11 months ago
- A collection of python cybersecurity projects☆45Updated last year
- ☆23Updated last month
- Book collection☆147Updated 5 years ago
- Knowledge for OSCP☆416Updated 8 months ago
- A collection of FREE cyber security books☆526Updated 2 months ago