nano-bot01 / Movie-Recommender-Web-Application
Movie Recommendation System based on machine learning concepts
☆10Updated last year
Related projects: ⓘ
- It Map Social Media With Photo☆27Updated last year
- All Type Of Tools written in multipule language .☆18Updated last year
- A Ransomware Based in AES256 Algorithm☆16Updated 2 years ago
- TechViper is an advanced web security scanner designed to detect various vulnerabilities in web applications.☆12Updated last month
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆19Updated 2 years ago
- A POC OF CVE-2022-2274 (openssl)☆16Updated last year
- Proof of Concept of CVE-2022-30190☆37Updated last year
- A collection of cybersecurity resources☆11Updated last month
- Config files for my GitHub profile.☆14Updated last year
- POC OF CVE-2022-21970☆14Updated last year
- POC Of CVE-2022-26937☆14Updated last year
- A POC of CVE-2022-30206☆15Updated last year
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Updated last month
- This is a tool for bug hunters☆13Updated 3 months ago
- Bxss Sniper: A web application penetration testing tool for Blind XSS detection☆12Updated 9 months ago
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆18Updated this week
- Subdomain finder written in python☆16Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆11Updated 7 months ago
- Whspdefendor Exploit Framework v1.0☆13Updated 9 months ago
- T-Converter Free v1.0☆16Updated last month
- POC Of CVE-2022-21971☆11Updated last year
- ☆14Updated 9 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆17Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 3 years ago
- Atlassian Confluence - Remote Code Execution☆9Updated 7 months ago
- dibuat oleh garena free fire☆10Updated 5 years ago
- xdebug 2.5.5 RCE exploit☆29Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- ☆17Updated 8 months ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 3 years ago