☆14Jul 15, 2018Updated 7 years ago
Alternatives and similar repositories for bellek-tasma
Users that are interested in bellek-tasma are comparing it to the libraries listed below
Sorting:
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- Malware Analysis (Zararlı Yazılım Analizi)☆32Aug 1, 2019Updated 6 years ago
- ☆17Sep 30, 2019Updated 6 years ago
- Active Directory Penetration Testing Tool☆29Nov 18, 2021Updated 4 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- ☆13Mar 9, 2017Updated 8 years ago
- ODSC 2023 workshop materials on causal graphs using implementations of DoWhy (PyWhy, EconML)☆13Nov 1, 2023Updated 2 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Module exercises: Create multi-page Xamarin.Forms apps with stack and tab navigation☆13Dec 8, 2022Updated 3 years ago
- Project files for jQuery for Total Noobs - https://nonoobleftbehind.com☆12Mar 23, 2018Updated 7 years ago
- Procreate-like disc color picker for the web☆15Feb 28, 2022Updated 4 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Feb 28, 2022Updated 4 years ago
- Learn LangChain for Genearative AI with OpenAI API using Python☆11Feb 15, 2024Updated 2 years ago
- en temel anlamıyla yazılım öğrenme sürecini anlamaya ve anlatmaya çalışmak☆12Dec 3, 2020Updated 5 years ago
- ☆37Jul 25, 2019Updated 6 years ago
- Powerful infrastructure development tool based on Ansible☆15Updated this week
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- ☆12May 10, 2023Updated 2 years ago
- R Data Mining, published by Packt☆13Jan 30, 2023Updated 3 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- KPI Reporter is a dev-friendly, on-premises tool for crafting automated reports on what matters to you.☆10Oct 6, 2022Updated 3 years ago
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- 📘 This repo is full of sample functions to learn common C programming routines. From string operations to math, file I/O to array manipu…☆10May 1, 2024Updated last year
- ☆12Mar 24, 2018Updated 7 years ago
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago
- ☆14Jun 13, 2022Updated 3 years ago
- Wraps the DB by opening a REST API for storing and retrieving documents info & recommendations☆10Jul 22, 2018Updated 7 years ago
- Türkçe Sahte Kişi/Kimlik/İsim Oluşturucu☆16Nov 10, 2020Updated 5 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- Robots - IoT - Watson - Swift - getting all things working together.☆10Jul 24, 2017Updated 8 years ago
- Building CricketPrediction model using Machine Learning☆14Oct 17, 2023Updated 2 years ago
- The website for CSSLint.☆14Sep 5, 2017Updated 8 years ago