☆15Oct 6, 2024Updated last year
Alternatives and similar repositories for DSA-RoadMap
Users that are interested in DSA-RoadMap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LinkedIn_AIHawk is a tool that automates the jobs application process on LinkedIn. Utilizing artificial intelligence, it enables users t…☆12Aug 24, 2024Updated last year
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated last year
- A minimalist microblogging platform 🐦🔇☆10May 14, 2026Updated last week
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 10 months ago
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated 2 years ago
- ☆74Feb 13, 2026Updated 3 months ago
- Enigma Machine in C☆13Nov 1, 2024Updated last year
- ☆31Jan 30, 2026Updated 3 months ago
- A documentation system that captures not just what you built, but why, how, and what you learned. Designed for human-LLM collaboration.☆31Jan 13, 2026Updated 4 months ago
- Universal prompt for Power users 💪🌈☆23Apr 18, 2026Updated last month
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 3 years ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆19Feb 26, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- ☆17Nov 29, 2025Updated 5 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 5 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆19Jul 29, 2024Updated last year
- 🛠️ This repository is continuously updated with new tools, scripts, and resources to support bug bounty hunters, penetration testers, re…☆26Aug 29, 2025Updated 8 months ago
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 4 years ago
- Join the GitHub Graduation Yearbook and "walk the stage" on June 11.☆13Jun 21, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The GitHub Project Manager 👩💻⚙☆30Dec 15, 2024Updated last year
- Burp-Suite Professional v1.7.37 Cracked☆19Sep 9, 2025Updated 8 months ago
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆24Jun 25, 2025Updated 10 months ago
- RestAI's Frontend☆22Sep 4, 2025Updated 8 months ago
- 🚀 👀 The website of Android Dev Notes. Content contributions are welcome! Found something interesting related to Android, just add it! c…☆11Dec 5, 2024Updated last year
- ☆22May 20, 2024Updated 2 years ago
- ☆12Dec 11, 2022Updated 3 years ago
- ☆13Mar 13, 2025Updated last year
- 🔑 Generate proofs and prove knowledge without revealing secrets. An open-source ZKP platform.☆13Apr 22, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- My bitcoin fork with many useful work branches for different purposes.☆14Sep 15, 2018Updated 7 years ago
- This is a quick introduction to getting started with the zkSnark Groth16 algorithm.☆24Sep 6, 2024Updated last year
- 1500+ Template Machine/Challenges for Hack The Box (HTB) and TryHackMe (THM) for Obsidian☆30Mar 8, 2025Updated last year
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆23Aug 30, 2024Updated last year
- ☆22Oct 13, 2025Updated 7 months ago
- Git Cheat Sheet and Commands☆92May 28, 2024Updated last year
- Tools Instagram (Features: Delete All Photo, Unfollow All Following, Unfollow Not FollowBack, and Much More)☆14Jun 30, 2018Updated 7 years ago