Learn MongoDB from absolute basics.
☆56Jan 16, 2026Updated last month
Alternatives and similar repositories for MongoDB-Zero-to-Hero
Users that are interested in MongoDB-Zero-to-Hero are comparing it to the libraries listed below
Sorting:
- ☆24Dec 4, 2025Updated 3 months ago
- ☆62Nov 25, 2025Updated 3 months ago
- ☆30Aug 8, 2025Updated 7 months ago
- Lite AI Assistant Chat Bot for interacting with LLMs.☆21Jul 31, 2025Updated 7 months ago
- Play super mario like game on your browser. While the game works well, alot of improvements in progress.☆37Sep 2, 2025Updated 6 months ago
- CI/CD Implementation for a demo rust application☆41Jun 7, 2025Updated 9 months ago
- Demo repository for spacelift tutorial.☆40May 16, 2025Updated 9 months ago
- Office Management Assistant During Covid19☆53Dec 4, 2025Updated 3 months ago
- Notes for my YouTube tutorial on Kubernetes Gateway API☆86Dec 18, 2025Updated 2 months ago
- ☆10Oct 30, 2020Updated 5 years ago
- A small wifi penetration testing tool-kit☆11Jul 21, 2023Updated 2 years ago
- A list of coding interview problems and solution discussion videos by Tamim Shahriar Subeen.☆42Feb 17, 2026Updated 2 weeks ago
- 🌀 an Interactive Terminal for AI (interminai) - A PTY proxy enabling AI interaction with interactive CLI applications like vim, git reba…☆44Feb 9, 2026Updated last month
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- ADE: automates Active Directory enumeration for labs (Hack The Box, Hack Smarter, TryHackMe, Proving Grounds) and exam prep (OSCP, CPTS).☆28Jan 19, 2026Updated last month
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆22Feb 15, 2026Updated 3 weeks ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆12Mar 25, 2021Updated 4 years ago
- OWASP Certified Secure-Software Developer☆22Feb 26, 2026Updated last week
- Awesome apps for users switching from the Mac to Linux☆12Apr 23, 2020Updated 5 years ago
- A Tiny Intent Classifier model for short customer-support style text. Given an input text (e.g., "Hi, I need help with my bill"), the m…☆38Dec 15, 2025Updated 2 months ago
- ☆14Jan 6, 2021Updated 5 years ago
- A simple, yet complete mailserver setup guide.☆12Jun 21, 2024Updated last year
- Sandbox☆20Jan 20, 2026Updated last month
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Apr 24, 2023Updated 2 years ago
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- Disable Kernel DMA Protection on Windows 11 via pre-boot DMA attack☆49Aug 18, 2025Updated 6 months ago
- Realtime MLOps Implementation using DVC, Docker, GitHub Actions, Kubernetes, KServe and Argo CD.☆42Jan 19, 2026Updated last month
- Pentest report framework without data send☆19Sep 23, 2025Updated 5 months ago
- Deception implementation through analysis of BloodHound data☆53Oct 9, 2025Updated 5 months ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- A different approach to writing BOFs in rust.☆19Aug 20, 2025Updated 6 months ago
- ☆19Jan 31, 2025Updated last year
- Cicada scripting language☆48Feb 7, 2026Updated last month
- ☆37Dec 4, 2025Updated 3 months ago
- ☆39Oct 9, 2025Updated 5 months ago
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆75Feb 28, 2026Updated last week