edoardottt / PostgresSQL-DBLinks
Easy implementation of some postgreSQL Databases for practicing with Conceptual analysis of requirements, design of relational databases and SQL queries
☆11Updated last year
Alternatives and similar repositories for PostgresSQL-DB
Users that are interested in PostgresSQL-DB are comparing it to the libraries listed below
Sorting:
- random scripts☆17Updated last year
- University Java project. It's a lightweight tool specialized in tweets analysis.☆11Updated last year
- Useful material for learning Python, start coding and learn how to logically solve real world problems.☆26Updated last year
- Migrate team-managed project issues between two JIRA Cloud accounts☆11Updated last year
- ☆10Updated last year
- Some of my assembly code (examples, iterative and recursive algorithms) from Computer's Architecture course in Sapienza University, CS Ba…☆19Updated last year
- Implementations of various problems using Python. Dynamic Programming, BackTracking & Sorting algorithms☆26Updated last year
- Simple C file decrypter☆12Updated last year
- Computer Network Exploitation (CNE) Field Manual☆14Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- SAVE THE EARTH! 👾 🎮☆12Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆58Updated last year
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Updated last year
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Wi-Fi Hacking Workshop☆14Updated 5 years ago
- Forensics Science Education☆11Updated 4 years ago
- ☆17Updated 5 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last week
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆29Updated 5 months ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Updated 2 months ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆18Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago