kunal-kushwaha / invisible-cloakView external linksLinks
☆14Mar 2, 2021Updated 4 years ago
Alternatives and similar repositories for invisible-cloak
Users that are interested in invisible-cloak are comparing it to the libraries listed below
Sorting:
- Join the GitHub Graduation Yearbook and "walk the stage" on June 11.☆13Jun 21, 2022Updated 3 years ago
- Kubernetes website and documentation repo:☆13Aug 18, 2021Updated 4 years ago
- ☆15Mar 21, 2021Updated 4 years ago
- Marketplace of Kubernetes applications available for quick and easy installation in to Civo Kubernetes clusters☆15Jun 16, 2024Updated last year
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- ☆12Dec 11, 2022Updated 3 years ago
- ☆19Feb 19, 2021Updated 4 years ago
- Resources and Materials for MATLAB Probability class☆10Oct 23, 2015Updated 10 years ago
- ☆12Nov 29, 2024Updated last year
- Enigma Machine in C☆13Nov 1, 2024Updated last year
- ☆10May 23, 2024Updated last year
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 8 months ago
- GDSC VIT GitHub repository template☆11Nov 3, 2023Updated 2 years ago
- A minimalist microblogging platform 🐦🔇☆10Jan 11, 2026Updated last month
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 6 months ago
- ☆12May 22, 2025Updated 8 months ago
- Slides, codes, and materials related to my courses☆15Dec 19, 2025Updated last month
- CNCF resource for students looking to get into the cloud native community☆39Aug 15, 2024Updated last year
- Exfiltrate data using ping and PowerShell, no admin access required☆14Mar 26, 2024Updated last year
- The nightmare giving MySQL migrator☆10Aug 19, 2016Updated 9 years ago
- ☆14Mar 13, 2025Updated 11 months ago
- This repository contains steps to train an object detection model using tensorflow on google colab☆10Dec 19, 2020Updated 5 years ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated last year
- Universal prompt for Power users 💪🌈☆19May 14, 2025Updated 9 months ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆17Jul 1, 2024Updated last year
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- ☆12Nov 11, 2023Updated 2 years ago
- A 2D physics engine programmed in C++ that makes use of verlet integration to implement simply physics☆10Oct 26, 2025Updated 3 months ago
- e2e Scanning research module☆22Jun 30, 2025Updated 7 months ago
- The repository contains important questions that are done in Coding Class and along with Aptitude PDF. Going through all set questions an…☆18Aug 5, 2023Updated 2 years ago
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- 📷 This repository is focused on having various feature implementation of OpenCV in Python. The aim is to have a minimal implementation o…☆131Aug 5, 2022Updated 3 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- GSSoC participants refer to the "main" branch of our project for previous codes. Make your PRs to "GSSoC21" branch only. Also, please "ST…☆12May 31, 2021Updated 4 years ago
- ☆15Oct 6, 2024Updated last year
- ☆17Mar 6, 2022Updated 3 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- ☆43Sep 4, 2021Updated 4 years ago
- SDE-CRACKERS helps you to build confidence in advance DSA problems and interview preparation. Only start doing these problems if you feel…☆14Jan 4, 2021Updated 5 years ago