In this we will start from the bottom of coding..
☆10Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for Back_to_Basics
Users that are interested in Back_to_Basics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!☆13Jun 6, 2021Updated 4 years ago
- ☆13Dec 19, 2017Updated 8 years ago
- A 10 weeks Data Structures And Algorithms Coding Challenge organized by Devs' Street.☆11Apr 28, 2021Updated 4 years ago
- Online auto proctoring quiz☆21Jun 9, 2021Updated 4 years ago
- ☆10Oct 3, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- ☆19Jun 1, 2021Updated 4 years ago
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 4 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- A project I made to practice my newfound Neural Network knowledge - I used Python and Numpy to train a network to recognize MNIST images.…☆12Mar 12, 2022Updated 4 years ago
- A Nmap script optimized for Hack the Box and CTFs☆14Feb 22, 2021Updated 5 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- GHunt Research & Development Toolkit☆17Dec 3, 2022Updated 3 years ago
- 📞 First ever OTP Bot maker for beginners. Generate your own OTP source in python or nodejs with any features you like!☆10Apr 21, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆24Mar 16, 2023Updated 3 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- «MrRobotQR» is an open source script that automates the process from entering a search keyword to deriving the private key of a Bitcoin …☆14Dec 7, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- ☆36Aug 25, 2021Updated 4 years ago
- Save vim undo files as /path/to/file instead of %path%to%file.☆13Apr 18, 2024Updated last year
- Project website + content☆24Apr 30, 2023Updated 2 years ago
- Study material for BITS WILP AIML 23-24☆31Jul 20, 2025Updated 8 months ago
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Feb 23, 2021Updated 5 years ago
- Chocolatey 'docker' package☆12Jan 21, 2019Updated 7 years ago
- ☆16Jun 21, 2012Updated 13 years ago
- ☆19Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- ☆10Mar 2, 2023Updated 3 years ago
- LaTeX-пакет для школьного морфемного анализа слов и синтаксического анализа предложений.☆12Sep 6, 2022Updated 3 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago