A collection of coding scripts, notes, and mini-projects covering Data Science, Data Engineering, Web Development, programming fundamentals, and various tech topics.
☆14Dec 26, 2025Updated 2 months ago
Alternatives and similar repositories for Various-Data-Science-Scripts
Users that are interested in Various-Data-Science-Scripts are comparing it to the libraries listed below
Sorting:
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- Share secrets encrypted☆14Updated this week
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- ☆14Feb 27, 2025Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆17Apr 10, 2022Updated 3 years ago
- This program is used to steal passwords on Google Chrome very easily with a message on a webhook discord.☆10Aug 11, 2021Updated 4 years ago
- Hacking-Beginner-to-Expert-Guide-by-James-Patterson☆18Mar 27, 2021Updated 4 years ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- A Windows Bitcoin wallet password recovery tool☆11Nov 30, 2020Updated 5 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 5 years ago
- Cannahome source code and database☆11Feb 22, 2023Updated 3 years ago
- My Solutions to ABSOLUTE JAVA™ 6th Edition Global Edition☆21Jun 16, 2022Updated 3 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Website dedicated to all things R and Databases☆15Sep 7, 2022Updated 3 years ago
- The Ranflood ransomware contrast tool☆17Dec 18, 2024Updated last year
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- Lightweight password strength checker that enforces a strong password policy.☆17Jan 3, 2023Updated 3 years ago
- A program to check the security of personal passwords.☆12Jul 19, 2022Updated 3 years ago
- Random Password Generator built with Next.js and JavaScript☆13Dec 14, 2021Updated 4 years ago
- 🗄️💧 Find exposed and unsecured databases from a list of hosts. 🗄️💧☆15Jul 1, 2021Updated 4 years ago
- Simple OOP library for using relational database and having fun☆12Aug 4, 2024Updated last year
- A generic helm chart that enables you to build pretty much any webservice with a worker, or type of database to associate with in a clean…☆12Mar 28, 2023Updated 2 years ago
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- Contributor tools for freeCodeCamp.org's open source codebase on GitHub.☆16Nov 29, 2021Updated 4 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- By LodCam tool you can generat phishing link of Loding site which can catch victim picture by victim front camera and and also gives you …☆20Aug 22, 2020Updated 5 years ago
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago
- FG 2024 Papers: Explore a comprehensive collection of research papers presented at one of the premier conferences on automatic face and g…☆15May 18, 2024Updated last year
- ☆16Apr 21, 2021Updated 4 years ago
- This is a nice and simple wrapper in Go over the scrypt password based key derivation algorithm.☆25Nov 3, 2022Updated 3 years ago
- Enhanced Java telegram bots runner built on top of the Telegram Bots library☆21Feb 11, 2026Updated 2 weeks ago
- Linux Cyber Warfare Distro☆21Dec 16, 2025Updated 2 months ago