ritikajha / vr-nightView external linksLinks
☆29Jun 4, 2021Updated 4 years ago
Alternatives and similar repositories for vr-night
Users that are interested in vr-night are comparing it to the libraries listed below
Sorting:
- The Watcher version 5.0☆19Nov 10, 2017Updated 8 years ago
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Aug 8, 2014Updated 11 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆252Oct 19, 2023Updated 2 years ago
- Turn your facial expression into an emoji☆288May 11, 2018Updated 7 years ago
- List of resources & possible pathway for the Math of Machine Learning and AI.☆415Sep 22, 2022Updated 3 years ago
- This is the code for "Generating Pokemon with a Generative Adversarial Network" by Siraj Raval on Youtube☆429Dec 1, 2018Updated 7 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆505Oct 8, 2017Updated 8 years ago
- This repo consists of aditya verma youtube channel code for different section.☆622Jun 16, 2024Updated last year
- Collection of Open Source Events and Hackathon's on a monthly basis. Contribute with us by just opening an issue or PR😉. For contributi…☆691Oct 10, 2022Updated 3 years ago
- These are the instructions for "100 Days of ML Code" By Siraj Raval on Youtube☆884Apr 8, 2025Updated 10 months ago
- C/C++ source obfuscator for antivirus bypass☆1,060Mar 10, 2022Updated 3 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,189Aug 1, 2019Updated 6 years ago
- List of Research Internships for Undergraduate Students☆4,824Updated this week
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆1,857Dec 8, 2025Updated 2 months ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,713Oct 8, 2023Updated 2 years ago
- jSQL Injection is a Java application for automatic SQL database injection.☆1,734Updated this week
- A tool for parsing breached passwords☆2,089Mar 21, 2024Updated last year
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,141May 13, 2023Updated 2 years ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,085Jun 22, 2024Updated last year
- This repo is creating providing students easy access to all the programs taught under Codehelp's DSA Busted Series.☆3,705Aug 16, 2024Updated last year
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,414Mar 1, 2024Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,223Nov 20, 2025Updated 2 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,537Feb 11, 2023Updated 3 years ago
- Find domains and subdomains related to a given domain☆3,514Jun 7, 2024Updated last year
- Papers about deep learning ordered by task, date. Current state-of-the-art papers are labelled.☆3,190Dec 21, 2019Updated 6 years ago
- This is the Curriculum for "How to Learn Mathematics Fast" By Siraj Raval on Youtube☆3,300Oct 12, 2019Updated 6 years ago
- 🔍 gowitness - a golang, web screenshot utility using Chrome Headless☆4,166Jan 21, 2026Updated 3 weeks ago
- A list of open source programs.☆3,841Aug 4, 2024Updated last year
- Prompt-To-Agent : Create custom engineering agents for your codebase☆5,153Updated this week
- Automatically sync your leetcode solutions to your github account - top 5 trending GitHub repository☆4,260Jun 7, 2024Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,792Jul 29, 2025Updated 6 months ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,991Dec 21, 2024Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,201Jan 31, 2026Updated 2 weeks ago
- An in-depth machine learning tutorial introducing readers to a whole machine learning pipeline from scratch.☆4,784Jan 15, 2023Updated 3 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,532Aug 6, 2023Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,638Jan 5, 2026Updated last month
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,000Feb 12, 2023Updated 3 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆6,255Jul 26, 2024Updated last year