aw-junaid / Computer-ScienceLinks
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies.
☆68Updated 9 months ago
Alternatives and similar repositories for Computer-Science
Users that are interested in Computer-Science are comparing it to the libraries listed below
Sorting:
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆698Updated last month
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆67Updated 9 months ago
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆59Updated 7 months ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆376Updated last year
- ☆121Updated 3 years ago
- EthicalHacking, Python, Nmap, Metasploit☆231Updated 5 years ago
- ☆240Updated 10 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆84Updated 2 years ago
- HacxGPT An advanced AI framework, engineered to explore the frontiers of language model interactions. Designed to provide powerful, unres…☆793Updated this week
- Hound is a simple and light tool for information gathering and capture exact GPS coordinates☆666Updated last year
- This is a project by ChillHack, focusing on developing WormGPT prompt hacking. It is designed for cybersecurity researchers to study adva…☆69Updated 2 months ago
- Malware attacks/techniques explained☆196Updated 5 months ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆67Updated 8 months ago
- It is a advanced keylogger.☆68Updated last year
- IPGhost is a strong tool for ethical hackers. This tool automatically changes your IP address , making it hard for anyone to track your …☆104Updated last month
- tool used to change your IP every second your want☆423Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆49Updated last year
- E-books related to hacking helps you to know more about hacking☆280Updated 5 years ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated 2 months ago
- Red Team Scaner☆56Updated 3 weeks ago
- Herramienta de OSINT para WhatsApp que permite obtener fotos de perfil, verificar cuentas Business, consultar estado e información de usu…☆65Updated 3 months ago
- Hackcctv☆242Updated 6 months ago
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is…☆21Updated 7 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆686Updated 3 weeks ago
- HackerGPT Cyber-Security Companion☆68Updated 4 months ago
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆37Updated 10 months ago
- Book collection☆150Updated 5 years ago
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆12Updated last year
- Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device re…☆20Updated 8 months ago
- Ethical Hacking Tutorials , Pentesting Resources☆68Updated 7 years ago