Collection of all courses, and their materials, attended at Politecnico di Milano during both Bachelor level degree and Master level degree in Engineering, Computer Science Engineering
☆27Feb 8, 2021Updated 5 years ago
Alternatives and similar repositories for Computer-Science-Engineering
Users that are interested in Computer-Science-Engineering are comparing it to the libraries listed below
Sorting:
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- MSc Computer Science Master Program in The York University☆33Apr 15, 2024Updated last year
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Jun 29, 2021Updated 4 years ago
- Personal pentest notes and playbooks<3☆32Jan 7, 2026Updated last month
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- 📚👨🎓 Resources I'm using everyday to develop my skills to become a self-taught good programmer ...☆32Nov 26, 2020Updated 5 years ago
- Info & resources for CSC 325 Computer Architecture at TCNJ☆11Oct 1, 2020Updated 5 years ago
- A little bit of help.☆13Jul 25, 2024Updated last year
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- A technical companion repository archiving code implementations and research artifacts shared on ResearchGate.☆12Feb 21, 2026Updated last week
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- ☆11Nov 30, 2020Updated 5 years ago
- This repository contains all the solutions of assignments, starter files and other materials related to this specialization.☆10Jan 31, 2021Updated 5 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- IITH BTECH CSE all Courses' Codes and Assignments☆11May 12, 2021Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- study the kernel data structures and its API☆13May 10, 2022Updated 3 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- ☆14Feb 27, 2025Updated last year
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 5 years ago
- All my stuff from university (homework, projects, lectures).☆49Dec 2, 2024Updated last year
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- Computer architecture for teaching and research in computer systems, with IDE, editor, assembler, linker, emulator, programming examples,…☆16Updated this week
- A Windows Bitcoin wallet password recovery tool☆11Nov 30, 2020Updated 5 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- anything I find interesting regarding reverse engineering☆13May 7, 2017Updated 8 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- This program is used to steal passwords on Google Chrome very easily with a message on a webhook discord.☆10Aug 11, 2021Updated 4 years ago
- This is a personal project which purpose is to learn computer architecture by implementing the Hack Computer.☆12Aug 30, 2021Updated 4 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Data Structures and Algorithms Explained in my own words☆15Jun 2, 2025Updated 8 months ago
- Experiments with Linux kernel modules☆12Feb 5, 2022Updated 4 years ago
- ☆10Jan 5, 2020Updated 6 years ago