aydinnyunus / CProjects
C Projects
☆11Updated 4 years ago
Alternatives and similar repositories for CProjects:
Users that are interested in CProjects are comparing it to the libraries listed below
- Machine Learning (Easy to Hard step by step)☆44Updated 5 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆22Updated 3 years ago
- Create Your AI ChatBot and Connect it to the Whatsapp !☆20Updated 3 years ago
- LinkedIn Scraper☆18Updated 5 years ago
- OpenCV OCR (Optical Character Recognition)☆17Updated 5 years ago
- Face Recognition Security☆169Updated last year
- bruteforcing gmail (TLS/SSL)☆38Updated 3 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆130Updated last year
- ☆25Updated 2 years ago
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆58Updated 4 years ago
- Linux Voice Assistant for to Make Your Work Easier☆37Updated 5 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆23Updated 4 years ago
- ☆20Updated 5 years ago
- AI Chat Bot for WhatsApp that impersonates you and chats with your contacts on your behalf☆23Updated 5 years ago
- Collection of Python Scripts☆175Updated 5 months ago
- A basic Python project.☆9Updated 3 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆33Updated last year
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆66Updated 5 years ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showe…☆41Updated 5 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆40Updated 4 years ago
- Hacking Scripts that will blow your mind engineered by Hackers ♠️.☆57Updated last year
- Implementation of Honey-Pot like server which will act as a proxy server for any main server☆6Updated 5 years ago
- Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.☆25Updated 4 years ago
- Tool perform evil twin attack & defence☆31Updated 5 years ago
- Fast exploitation based on metasploit.☆73Updated 5 years ago
- a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, e…☆48Updated 2 years ago
- ☆29Updated 3 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Updated 2 years ago
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Updated 4 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆31Updated 2 years ago