aw-junaid / Computer-ScienceLinks
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies. Ideal for learners and enthusiasts looking to enhance their knowledge and skills in the field
☆57Updated 5 months ago
Alternatives and similar repositories for Computer-Science
Users that are interested in Computer-Science are comparing it to the libraries listed below
Sorting:
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆614Updated 5 months ago
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆37Updated 5 months ago
- EthicalHacking, Python, Nmap, Metasploit☆165Updated 4 years ago
- ☆116Updated 2 years ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆341Updated last year
- E-books related to hacking helps you to know more about hacking☆191Updated 5 years ago
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆32Updated 3 months ago
- ☆202Updated 6 months ago
- It is a advanced keylogger.☆58Updated last year
- A curated collection of darknet resources for educational purposes, offering insights into darknet frameworks, tools, and security practi…☆78Updated 10 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆64Updated last year
- ☆352Updated last year
- Getting Target Browser information by using a URL☆35Updated 8 months ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆58Updated 4 months ago
- tool used to change your IP every second your want☆390Updated last year
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆466Updated last year
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆33Updated 6 months ago
- Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great…☆185Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated 2 months ago
- Magnet Link for Downloading☆284Updated last year
- A collection of FREE cyber security books☆517Updated last month
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆550Updated last month
- Ethical Hacking Tutorials , Pentesting Resources☆69Updated 6 years ago
- Book collection☆147Updated 5 years ago
- Malware attacks/techniques explained☆183Updated last month
- An easy to use python code to do a DDoS attack.☆41Updated last year
- A collection of python cybersecurity projects☆46Updated last year
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆23Updated 3 months ago
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆270Updated 6 months ago
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆113Updated 10 months ago