Hacking Tricks, Techniques & Tools
☆15Sep 18, 2020Updated 5 years ago
Alternatives and similar repositories for Hacking-Notebooks
Users that are interested in Hacking-Notebooks are comparing it to the libraries listed below
Sorting:
- Instructions to Setup Development Environments on Windows 10, Mac and Linux☆13Sep 8, 2022Updated 3 years ago
- CS3 - Introduction to Algorithms in C++ using Jupyter Notebooks☆14Sep 8, 2022Updated 3 years ago
- CS2 - Data Structures & Applications using C++ & Jupyter Notebook☆11Sep 8, 2022Updated 3 years ago
- Detecting and Classifying Android Malware using Deep Learning Techniques☆24Jun 16, 2020Updated 5 years ago
- Jupyter Notebooks for Learning Bash Commands and Scripts☆14Jan 25, 2023Updated 3 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆53Feb 19, 2023Updated 3 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆23Jul 27, 2020Updated 5 years ago
- Jupyter notebooks for learning JavaScript using Node.js☆19Mar 7, 2023Updated 2 years ago
- Introduction to Database Course Materials☆12Jan 24, 2026Updated last month
- Jupyter Notebooks for Learning CS Foundational Concepts using C++☆33Updated this week
- This project aims to capture network traffic on a local network, filter out packets related to WhatsApp calls, and extract the public IP …☆22Jan 21, 2025Updated last year
- Financial Analytics-Loan Approval Prediction(Using all machine learning models)☆14Dec 2, 2022Updated 3 years ago
- ☆11May 30, 2021Updated 4 years ago
- Helper scripts to remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabili…☆52Feb 21, 2021Updated 5 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- ☆13Jan 20, 2022Updated 4 years ago
- ☆12Aug 7, 2024Updated last year
- ☆14Jul 18, 2019Updated 6 years ago
- A Windows Automation Script module for Powershell☆12Mar 31, 2023Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- Google hacking☆11Apr 26, 2023Updated 2 years ago
- Researcher Contributions☆14Updated this week
- Rubber Ducky arming script wizard : Setup quickly your Rubber Ducky☆10Jan 18, 2018Updated 8 years ago
- Kattis demo solutions with unit testing☆16Nov 17, 2023Updated 2 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Tool Desgined to remove unwanted apps from Xioami Devices.☆13Oct 22, 2023Updated 2 years ago
- Windows 10 PRO Activator - No more backdoors via loaders from China and neither you will need any crack anymore that is valid for a week …☆12Dec 22, 2018Updated 7 years ago
- Documentation and quickstart for TempleOS and HolyC☆10Jun 25, 2019Updated 6 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆172Dec 15, 2019Updated 6 years ago
- Bash scripts that help you audit the system administration on a Linux server☆11Jun 26, 2017Updated 8 years ago
- Athal comment generator (Mostly for parana photo udata ganna)☆11Apr 5, 2020Updated 5 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Project List☆22Jun 10, 2025Updated 8 months ago
- Python-based stack trace analysis tools☆10May 7, 2018Updated 7 years ago
- Python utility codes, mainly for Kattis and AoC☆17Updated this week
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- ZAP test code☆14May 7, 2015Updated 10 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago