niikhiljha / her-birthdayLinks
☆11Updated last year
Alternatives and similar repositories for her-birthday
Users that are interested in her-birthday are comparing it to the libraries listed below
Sorting:
- 100 days of cybersecurity - join Discord and connect with us to know more on this challenge #100daysofcybersecurity #sector21☆188Updated 5 months ago
- This portfolio is suitable for the person who are interested in ethtical hacking. This project is created using HTML, CSS and JS. Easy to…☆40Updated last year
- This study guide have some [practical labs] to test your knowledge and learn by doing.☆80Updated 2 years ago
- it content free resources including courses that help you to learn ethical hacking for beginners to advanced☆56Updated 2 years ago
- ☆25Updated 11 months ago
- TryhackMerooms☆20Updated 2 years ago
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆22Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆19Updated last year
- Hello, aspiring hackers! 🕵️♂️ Here’s a list of 500+ Free TryHackMe rooms to kickstart your cybersecurity journey. These rooms are absol…☆176Updated 3 weeks ago
- notes☆157Updated last month
- ☆48Updated last year
- Elevate your cybersecurity profile with this streamlined portfolio template. Showcase exploits, projects, and skills succinctly. Perfect …☆16Updated last year
- ☆22Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated 2 months ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆76Updated 2 years ago
- Here you can find mostly all disclosed h1 reports☆27Updated 3 years ago
- This Repository Contains some of the solution of the task assigned during the KPMG_CTF 2023-07-28 to 2023-07-30☆19Updated last year
- ☆45Updated last year
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆23Updated 3 months ago
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆10Updated 11 months ago
- Basic tool for Information Gathering 🚀☆15Updated last year
- An insane list of all dorks taken from everywhere from various different sources.☆694Updated 9 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆205Updated 3 months ago
- Study notes for the Certified Ethical Hacker v12.☆132Updated last year
- Practice material for my subscribers.☆21Updated 10 months ago
- A collection of python cybersecurity projects☆46Updated last year
- Personal portfolio- The site showcases his projects, skills, and contact information, emphasizing his expertise in front-end development …☆10Updated 3 weeks ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆64Updated last year
- ☆76Updated 11 months ago
- ☆213Updated last year