aw-junaid / Computer-ScienceLinks
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies. Ideal for learners and enthusiasts looking to enhance their knowledge and skills in the field
☆57Updated 5 months ago
Alternatives and similar repositories for Computer-Science
Users that are interested in Computer-Science are comparing it to the libraries listed below
Sorting:
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆609Updated 4 months ago
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆31Updated 5 months ago
- ☆198Updated 5 months ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆324Updated last year
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆31Updated 2 months ago
- EthicalHacking, Python, Nmap, Metasploit☆161Updated 4 years ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆60Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆32Updated last month
- A curated collection of darknet resources for educational purposes, offering insights into darknet frameworks, tools, and security practi…☆67Updated 9 months ago
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆448Updated last year
- E-books related to hacking helps you to know more about hacking☆163Updated 4 years ago
- ☆117Updated 2 years ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆521Updated 3 weeks ago
- It is a advanced keylogger.☆56Updated last year
- Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great…☆179Updated last year
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆57Updated 3 months ago
- ☆348Updated 11 months ago
- Hound is a simple and light tool for information gathering and capture exact GPS coordinates☆551Updated last year
- BlackHat C++ : C++ For Pentesters, by EC-Council☆67Updated 2 years ago
- tool used to change your IP every second your want☆373Updated last year
- it content free resources including courses that help you to learn ethical hacking for beginners to advanced☆56Updated 2 years ago
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆266Updated 6 months ago
- Ethical Hacking Tutorials , Pentesting Resources☆68Updated 6 years ago
- Elevate your cybersecurity profile with this streamlined portfolio template. Showcase exploits, projects, and skills succinctly. Perfect …☆16Updated last year
- Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device re…☆19Updated 4 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆441Updated last week
- Hackcctv☆184Updated 2 months ago
- Malware attacks/techniques explained☆178Updated last month
- WiFi Penetration Testing & Auditing Tool☆537Updated 3 months ago
- books☆32Updated 5 years ago