vishaltewatia / DSA-RoadMapView external linksLinks
☆15Oct 6, 2024Updated last year
Alternatives and similar repositories for DSA-RoadMap
Users that are interested in DSA-RoadMap are comparing it to the libraries listed below
Sorting:
- Telegram Bot to store Posts and Documents and it can Access by Special Links. Custom Features with 2 Force Subs Channel Support And Many…☆10Jan 9, 2025Updated last year
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 8 months ago
- A minimalist microblogging platform 🐦🔇☆10Jan 11, 2026Updated last month
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 6 months ago
- Slides, codes, and materials related to my courses☆15Dec 19, 2025Updated last month
- The nightmare giving MySQL migrator☆10Aug 19, 2016Updated 9 years ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated last year
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆17Jul 1, 2024Updated last year
- ☆13Mar 13, 2025Updated 11 months ago
- Join the GitHub Graduation Yearbook and "walk the stage" on June 11.☆13Jun 21, 2022Updated 3 years ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆19Jun 25, 2025Updated 7 months ago
- A documentation system that captures not just what you built, but why, how, and what you learned. Designed for human-LLM collaboration.☆31Jan 13, 2026Updated last month
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- e2e Scanning research module☆22Jun 30, 2025Updated 7 months ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Meta Prompting to generate AI instructions, agents, skills & prompts☆40Updated this week
- Kubernetes website and documentation repo:☆13Aug 18, 2021Updated 4 years ago
- Tools Instagram (Features: Delete All Photo, Unfollow All Following, Unfollow Not FollowBack, and Much More)☆14Jun 30, 2018Updated 7 years ago
- 🚀 👀 The website of Android Dev Notes. Content contributions are welcome! Found something interesting related to Android, just add it! c…☆11Dec 5, 2024Updated last year
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- ☆15Nov 29, 2025Updated 2 months ago
- Burp-Suite Professional v1.7.37 Cracked☆19Sep 9, 2025Updated 5 months ago
- ☆14Mar 2, 2021Updated 4 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆27Sep 4, 2025Updated 5 months ago
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- 1500+ Template Machine/Challenges for Hack The Box (HTB) and TryHackMe (THM) for Obsidian☆27Mar 8, 2025Updated 11 months ago
- This is a quick introduction to getting started with the zkSnark Groth16 algorithm.☆22Sep 6, 2024Updated last year
- Official Implementation of "ToolSafe: Enhancing Tool Invocation Safety of LLM-based Agents via Proactive Step-level Guardrail and Feedbac…☆35Jan 23, 2026Updated 3 weeks ago
- A simple python based Key-Logger project in Cyber Security☆42Jan 30, 2025Updated last year
- Entire Machine Learning Hand Written Notes☆19Apr 3, 2023Updated 2 years ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆19Jun 27, 2022Updated 3 years ago
- Learn Ethical Hacking From Scratch, published by Packt☆23Jan 30, 2023Updated 3 years ago
- Solutions for the HackThisSite Missions☆16Nov 29, 2017Updated 8 years ago
- 🔑 Generate proofs and prove knowledge without revealing secrets. An open-source ZKP platform.☆14Apr 22, 2024Updated last year
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year