sandy9999 / Sih_Rk312_winterfellLinks
Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & Column Structure) file format. Desired Solution: The solution should take different input file formats like .XLSX, .CSV, TXT. and it shall convert into Info Graphical and Data Visualizer forms with connected R…
☆13Updated 4 years ago
Alternatives and similar repositories for Sih_Rk312_winterfell
Users that are interested in Sih_Rk312_winterfell are comparing it to the libraries listed below
Sorting:
- Remembering numerous passwords from various different sites can be difficult for a user. So to provide some flexibility we can provide us…☆6Updated 3 years ago
- Smart India Hackathon 2023☆32Updated last year
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆23Updated 3 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- Travel And Tourism - Database web Application Implemented using Flask framework, Sqlalchemy, Html,Css,Js.☆10Updated 4 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆14Updated 7 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Updated 4 years ago
- The Advanced Automated Pentesting And Forensics Tool☆26Updated last year
- Hashes of infamous malware☆26Updated last year
- A platform based on blockchain where fundraisers meet backers to raise funds for noble cause☆17Updated 2 months ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆18Updated 3 years ago
- ☆24Updated 4 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- Smart Contracts Blockchain Project With Code and Report for Banking System. Solidity bank Dapp project☆17Updated 2 years ago
- Password Controls and Security Policies☆21Updated 4 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 5 months ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and c…☆8Updated 2 years ago
- Pentest ToolKit☆28Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Updated 5 years ago