zenort / Microsoft-DEV236x-Links
Introduction to Python Absolute Beginner (Microsoft) on EDX DEV236x : all the practices, and notes with screenshots
☆7Updated 6 years ago
Alternatives and similar repositories for Microsoft-DEV236x-
Users that are interested in Microsoft-DEV236x- are comparing it to the libraries listed below
Sorting:
- ☆9Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11Updated 6 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆12Updated 4 years ago
- ☆12Updated 6 years ago
- Sends public ip through e-mail. Command-line standalone.☆13Updated 8 years ago
- "Aim for simplicity in Data Science. Real creativity won't make things more complex. Instead, it will simplify them." ― Damian Duffy Ming…☆8Updated 5 years ago
- A wave function tunneling across a barrier☆7Updated 6 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 2 months ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- ☆12Updated 6 years ago
- Supplementary materials for my blog: www.mustythoughts.com☆9Updated 5 years ago
- my open-source notes☆31Updated 8 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Scripts for pentesting/hacking☆18Updated 3 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 6 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- The system is broken face recognition for adversarial example testing.☆19Updated 3 years ago
- Collect and filter location information from social network services.☆10Updated 4 years ago
- Gathers current reported online malicious websites and grabs the content for offline analyzing☆14Updated 6 years ago
- HashExpoit is Great Tool For Cracking Hash☆25Updated 4 years ago
- A set of simple tutorial programs for quantum computing including a game, Fly Unicorn.☆14Updated 5 years ago
- Convert video to pseudo-hologram video☆10Updated 3 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆11Updated 6 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆18Updated 5 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- "AI research can have irreversible repercussions in the life of the human species, so we must tread cautiously." ― Abhijit Naskar☆9Updated 5 years ago
- cve-search - a tool to perform local searches for known vulnerabilities☆8Updated 8 years ago
- This repository contains the source code used to produce the results presented in the paper "Progress towards practical qubit computation…☆11Updated 5 years ago
- A quantum puzzle game featuring Schrödinger's cat.☆13Updated 4 years ago
- Installer and Instructions☆11Updated 5 months ago