☆15Oct 6, 2024Updated last year
Alternatives and similar repositories for DSA-RoadMap
Users that are interested in DSA-RoadMap are comparing it to the libraries listed below
Sorting:
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- ☆13Nov 29, 2024Updated last year
- 🛠️ This repository is continuously updated with new tools, scripts, and resources to support bug bounty hunters, penetration testers, re…☆22Aug 29, 2025Updated 6 months ago
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 9 months ago
- A minimalist microblogging platform 🐦🔇☆10Feb 22, 2026Updated 2 weeks ago
- Slides, codes, and materials related to my courses☆15Dec 19, 2025Updated 2 months ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 7 months ago
- The nightmare giving MySQL migrator☆10Aug 19, 2016Updated 9 years ago
- ☆12Nov 11, 2023Updated 2 years ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- Join the GitHub Graduation Yearbook and "walk the stage" on June 11.☆13Jun 21, 2022Updated 3 years ago
- ☆14Mar 13, 2025Updated 11 months ago
- 🚀 100% local RAG system with one-command setup. Your data never leaves your server. AGPL-3.0☆43Mar 2, 2026Updated last week
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆17Feb 26, 2026Updated last week
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- e2e Scanning research module☆22Jun 30, 2025Updated 8 months ago
- Universal prompt for Power users 💪🌈☆20May 14, 2025Updated 9 months ago
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated last year
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- ☆14Mar 2, 2021Updated 5 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- Kubernetes website and documentation repo:☆13Aug 18, 2021Updated 4 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- My bitcoin fork with many useful work branches for different purposes.☆14Sep 15, 2018Updated 7 years ago
- Burp-Suite Professional v1.7.37 Cracked☆19Sep 9, 2025Updated 5 months ago
- 🚀 👀 The website of Android Dev Notes. Content contributions are welcome! Found something interesting related to Android, just add it! c…☆11Dec 5, 2024Updated last year
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆29Sep 4, 2025Updated 6 months ago
- 1500+ Template Machine/Challenges for Hack The Box (HTB) and TryHackMe (THM) for Obsidian☆27Mar 8, 2025Updated last year
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- Official Implementation of "ToolSafe: Enhancing Tool Invocation Safety of LLM-based Agents via Proactive Step-level Guardrail and Feedbac…☆39Jan 23, 2026Updated last month
- Entire Machine Learning Hand Written Notes☆19Apr 3, 2023Updated 2 years ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆19Jun 27, 2022Updated 3 years ago
- Solutions for the HackThisSite Missions☆16Nov 29, 2017Updated 8 years ago
- Learn Ethical Hacking From Scratch, published by Packt☆23Jan 30, 2023Updated 3 years ago
- 🔑 Generate proofs and prove knowledge without revealing secrets. An open-source ZKP platform.☆13Apr 22, 2024Updated last year
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year
- Swaying Windows in Wayland 🎏🛣☆18Oct 12, 2025Updated 4 months ago