pepe / culs-frontend-23Links
Materials for the Contemporary frontend course
☆42Updated last year
Alternatives and similar repositories for culs-frontend-23
Users that are interested in culs-frontend-23 are comparing it to the libraries listed below
Sorting:
- Practical Ethical Hacking Labs 🗡🛡☆3,071Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆389Updated 8 months ago
- Free educational courses in reverse engineering, malware analysis, and programming☆432Updated last month
- Reverse Engineering and Malware Analysis Roadmap☆193Updated 3 weeks ago
- ImagiMingle is a Python project that generates random images using Unsplash's API. It features a user-friendly interface to easily explor…☆16Updated 9 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆346Updated this week
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆30Updated last month
- E-locks: A blockchain-based voting system E-locks is a robust voting system implemented in C++ and OpenCV, leveraging blockchain technolo…☆14Updated 11 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆299Updated last month
- VKACTF-2023 Writeups☆9Updated 2 years ago
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.☆80Updated last week
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆115Updated 3 weeks ago
- Small collection of Ransomware organized by family.☆230Updated 8 months ago
- Embed a payload inside a PNG file☆321Updated 7 months ago
- Pure Malware Development Resource Collections☆297Updated 5 months ago
- ☆322Updated 2 months ago
- HTML smuggling is not an evil, it can be useful☆386Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆304Updated last week
- Docker container for quickly analyzing Linux malware☆76Updated last year
- List of learning resources, learning platforms, and tools useful for CTF and cybersecurity in general☆19Updated 3 years ago
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified P…☆291Updated last month
- Linux-based botnet builder designed for creating advanced botnet payloads.☆87Updated last week
- The Industrial Revolution and its consequences have been a disaster for the human race.☆322Updated 11 months ago
- An insane list of all dorks taken from everywhere from various different sources.☆673Updated 6 months ago
- Введение в разработку вредоносных программ☆10Updated last year
- In-depth repository of Telegram OSINT resources covering, tools, techniques & tradecraft.☆1,309Updated last week
- Phone: A Mobile Phone Forensic Framework ( Android )☆199Updated 2 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆242Updated 8 months ago
- Tool to automate the recon phase for bug bounties☆9Updated 8 months ago
- Public repository containing materials for various malware-related streams.☆36Updated last month