aw-junaid / Computer-Science
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies. Ideal for learners and enthusiasts looking to enhance their knowledge and skills in the field
☆49Updated this week
Alternatives and similar repositories for Computer-Science:
Users that are interested in Computer-Science are comparing it to the libraries listed below
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆500Updated last week
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆17Updated this week
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆223Updated 8 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆44Updated last year
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆25Updated 2 weeks ago
- Hackcctv☆139Updated last month
- Study notes for the Certified Ethical Hacker v12.☆119Updated 9 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆163Updated 8 months ago
- Welcome to Page where you will find all kind free and premium cyber security/hacking/pentesting related ebooks☆95Updated 2 months ago
- Magnet Link for Downloading☆232Updated 7 months ago
- Ethical Hacking Tutorials , Pentesting Resources☆53Updated 6 years ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆291Updated 3 months ago
- Passlord is a smart tool that creates lists of possible passwords using clever methods.☆22Updated 7 months ago
- The Black Hat Bash book repository☆230Updated 2 months ago
- ☆98Updated 2 years ago
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆228Updated last week
- ☆71Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆243Updated last year
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆56Updated 4 months ago
- ☆100Updated last year
- A collection of malware/viruses/spyware code (not for real use) designed to teach malware analysis☆17Updated 2 months ago
- It is a advanced keylogger.☆39Updated 7 months ago
- Cybersecurity Resources☆277Updated 6 months ago
- Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great…☆163Updated last year
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆43Updated 2 months ago
- 100 Hacking Tools and Resources☆96Updated last year
- WiFi Penetration Testing & Auditing Tool☆463Updated 3 weeks ago
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆234Updated last year
- Repository for security-related Python scripts.☆200Updated 2 years ago
- This study guide have some [practical labs] to test your knowledge and learn by doing.☆58Updated last year