Lists (4)
Sort Name ascending (A-Z)
Stars
My Notes about Penetration Testing
Public content repository for Windows Server content.
Cryptography and Network Security Lab programs done in 7th semester of SIT(VTU).
PhishGuard is an interactive cyber awareness game designed to educate users about phishing attacks and improve their ability to detect and avoid them.
Tools and Techniques for Red Team / Penetration Testing
Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App
Onion Endpoints Fetcher is a web-based tool designed to fetch and display endpoints from onion sites on the TOR network.
Whatsapp Hacking, Instagram Hacking, Email Hacking, Database Hacking, Website Hacking, Bitcoin wallet recovery, social media account, remote phone access, ddos, location tracking, iphone hack, andr…
This is a Hacking tool for Telegram. For Ethical Hackers, CyberSecurity Enthusiasts and Penetration Testers. EXPLOIT RESPONSIBILY!!!!
A Script to Crash WhatsApp With Just a Single Text And Inject a Payload In App Format to Hack and Extract All WhatsApp Media Files.
Tool Information Gathering & social engineering Write By [Python,JS,PHP]
Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
Hands-on beginner projects for securing cloud resources in AWS, Azure, and GCP.
Hands-on projects for beginners to learn and practice Active Directory monitoring using various tools.
Fully Local Manus AI. No APIs, No $200 monthly bills. Enjoy an autonomous agent that thinks, browses the web, and code for the sole cost of electricity. 🔔 Official updates only via twitter @Martin9…
Tools and Techniques for Blue Team / Incident Response
PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multiple security tools and custom modules for reconnaissance, expl…
List, utilize and cheatsheet of Ethical Hacking tools
12 Lessons to Get Started Building AI Agents
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".
EnergyPredict with ST model(SimVP + CBAM) and Timseries anomaly detection with AE(LSTM, GRU and TCN)
Purposed a network traffic classification and prediction model based on CNN, TCN and Attention mechanism.