aw-junaid / Quantum-MechanicsLinks
My personal research on quantum mechanics and quantum computing.
☆11Updated 7 months ago
Alternatives and similar repositories for Quantum-Mechanics
Users that are interested in Quantum-Mechanics are comparing it to the libraries listed below
Sorting:
- Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emer…☆60Updated 8 months ago
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆52Updated 8 months ago
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆46Updated 5 months ago
- Malware attacks/techniques explained☆191Updated 4 months ago
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆655Updated last week
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆167Updated 5 months ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆494Updated 10 months ago
- ☆10Updated 3 years ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆182Updated 4 years ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆79Updated 2 years ago
- It is a advanced keylogger.☆63Updated last year
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆36Updated 9 months ago
- BlackHat C++ : C++ For Pentesters, by EC-Council☆71Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆231Updated last year
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆537Updated 3 months ago
- ☆118Updated 3 years ago
- CraxsRat is a sophisticated Android remote access trojan (RAT) that grants cybercriminals extensive control over infected devices. It is …☆81Updated last year
- Hackcctv☆212Updated 5 months ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆614Updated 8 months ago
- Here are some of the most important cyber security tools.☆42Updated 2 years ago
- A repository full of malware samples.☆1,466Updated last year
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆283Updated 9 months ago
- A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jam…☆602Updated 3 months ago
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆317Updated last month
- Jupyter-notebooks for the course Advanced Computational Methods in Physics 2024: Quantum many-body and tensor networks (Aalto University)☆24Updated 3 weeks ago
- SMS flooding tool☆19Updated 6 months ago
- The Black Hat Bash book repository☆309Updated 3 months ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆218Updated 2 years ago
- ☆221Updated 8 months ago
- ☆54Updated 2 years ago