ALL Subject of Notes that are asked in GATE
☆27Aug 11, 2019Updated 6 years ago
Alternatives and similar repositories for GATE-Preparation
Users that are interested in GATE-Preparation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- here the notes provided by the seniors who already cracked IITs as well as how much I'll cover for my exams I'll provide my notes as well…☆64Mar 23, 2026Updated last month
- A curated list of free and paid certifications, badges and courses☆18Dec 2, 2023Updated 2 years ago
- 100 Days of CSS challenge with Parcel, PostCSS and Pug.☆12Dec 10, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- This contains all the standard codes/solutions to the problems present in the pepcoding data structures and algorithms' resources as well…☆22Sep 5, 2024Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- This repository contains resources, preparation guide for placements and other opportunities.☆17Dec 20, 2020Updated 5 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BoltWire v6.03 vulnerable to "Improper Access Control"☆14Oct 31, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆14Feb 7, 2023Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- ☆15Feb 28, 2020Updated 6 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- 这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)☆17Dec 10, 2024Updated last year
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- Resources for placement purpose, it contains all important materials and contents required for placement.☆38Sep 25, 2025Updated 7 months ago
- MCP server for using the REMnux malware analysis toolkit via AI assistants☆75Mar 31, 2026Updated last month
- Activation of Office 2019☆13Oct 13, 2019Updated 6 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- wsnet☆26Mar 4, 2026Updated 2 months ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆24Jun 13, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆22Jan 29, 2025Updated last year
- ☆13Sep 25, 2022Updated 3 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆39Sep 23, 2023Updated 2 years ago
- PoC for CVE-2023-20126☆24Jun 20, 2023Updated 2 years ago
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆21Jul 7, 2024Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago