shirmeir / notebooksView external linksLinks
☆11Nov 30, 2020Updated 5 years ago
Alternatives and similar repositories for notebooks
Users that are interested in notebooks are comparing it to the libraries listed below
Sorting:
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 2 months ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- ☆11Oct 22, 2019Updated 6 years ago
- Factory Planning Optimization Project (2015)☆12Jun 4, 2019Updated 6 years ago
- ☆12Jan 16, 2024Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Repository for the Huntsville/Madison DevOps for Defense Meetup. Join us at meetup.com.☆11Aug 10, 2024Updated last year
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆11Aug 23, 2021Updated 4 years ago
- ☆13Feb 27, 2025Updated 11 months ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Share secrets encrypted☆14Feb 3, 2026Updated last week
- Multi Destination Trips dataset for research purposes - fully anonymized, sampled, limited☆17Jul 9, 2022Updated 3 years ago
- Hacking-Beginner-to-Expert-Guide-by-James-Patterson☆18Mar 27, 2021Updated 4 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆17Apr 10, 2022Updated 3 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 2 years ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- ☆11Jun 15, 2015Updated 10 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- A Windows Bitcoin wallet password recovery tool☆11Nov 30, 2020Updated 5 years ago
- Quantum annealing for traveling salesman problem☆11Jul 19, 2018Updated 7 years ago
- ☆12May 2, 2025Updated 9 months ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- The Ranflood ransomware contrast tool☆17Dec 18, 2024Updated last year
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 5 years ago
- Priss is a CSS print framework that ensures that your web pages are nice and readable when printed.☆32Mar 31, 2010Updated 15 years ago
- My Solutions to ABSOLUTE JAVA™ 6th Edition Global Edition☆21Jun 16, 2022Updated 3 years ago
- Cannahome source code and database☆12Feb 22, 2023Updated 2 years ago
- Website dedicated to all things R and Databases☆15Sep 7, 2022Updated 3 years ago
- A package for accessing InfluxDB from Laravel 5.5+, based on configuration settings.☆13Mar 21, 2019Updated 6 years ago
- A program to check the security of personal passwords.☆12Jul 19, 2022Updated 3 years ago
- Simple CRUD app to get familiar with Koa.js☆12May 14, 2018Updated 7 years ago
- Deep learning for interpreting chest x-rays☆13Feb 12, 2025Updated last year
- Complex Systems 530 - Computer Modeling of Complex Systems (Winter 2016)☆14Apr 15, 2016Updated 9 years ago