Mohamad Shikh Mhd (Tlopasha)

Tlopasha

Geek Repo

Location:Köln DE

Github PK Tool:Github PK Tool

Mohamad Shikh Mhd's repositories

Algorithm-Data-Structures-Python

Various useful data structures in Python

Language:Jupyter NotebookLicense:MITStargazers:0Issues:1Issues:0

awesome-bugbounty-tools

A curated list of various bug bounty tools

License:CC0-1.0Stargazers:0Issues:0Issues:0

awesome-vulnerable-apps

Awesome Vulnerable Applications

License:CC0-1.0Stargazers:0Issues:0Issues:0

Design-Analysis-of-Algorithms

Some C codes, for my Design and Analysis of Algorithms. Lab and Home Work

Language:CStargazers:0Issues:1Issues:0

food-nutrients

:fork_and_knife: Food Nutrients

Language:JavaScriptLicense:MITStargazers:0Issues:1Issues:0

frontend

Frontend UI for Dependency-Track

Language:VueLicense:Apache-2.0Stargazers:0Issues:1Issues:0

hugo-PaperMod

A fast, clean, responsive Hugo theme.

Language:HTMLLicense:MITStargazers:0Issues:0Issues:0

subnet_calculator

A simple CIDR/VLSM Calculator written with HTML & JS.

Language:HTMLStargazers:0Issues:1Issues:0

tlopasha.github.io

Beautiful portfolio style template for jekyll

Language:CSSLicense:MITStargazers:0Issues:0Issues:0

IMSI-catcher

This program show you IMSI numbers of cellphones around you.

Language:PythonLicense:CC0-1.0Stargazers:0Issues:1Issues:0

iva

IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.

Language:PythonLicense:LGPL-3.0Stargazers:0Issues:0Issues:0

Kage

Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler

Language:VueLicense:GPL-3.0Stargazers:0Issues:1Issues:0

KubernetesLabs

K8S Walkthrough code samples

Stargazers:0Issues:0Issues:0

OSCP

Materials for OSCP exam

Stargazers:0Issues:1Issues:0

OSCP-2

Collection of things made during my OSCP journey

Language:PythonStargazers:0Issues:1Issues:0

PENTESTING-BIBLE

Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.

License:MITStargazers:0Issues:1Issues:0

python-pentest-tools

Python tools for penetration testers

License:MITStargazers:0Issues:1Issues:0

Reverse-Engineering

Reverse Engineering

Language:ShellStargazers:0Issues:1Issues:0

RexCrypter

Crypter made in C#. Nearly FUD. Detection rate 2/38

Language:C#Stargazers:0Issues:1Issues:0

Screenshot-to-code

A neural network that transforms a design mock-up into a static website.

Language:HTMLLicense:NOASSERTIONStargazers:0Issues:0Issues:0

SecConArchive

Security Conference Archive

Language:Objective-CStargazers:0Issues:1Issues:0

the-book-of-secret-knowledge

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

License:MITStargazers:0Issues:1Issues:0

tudo

TUDO - A vulnerable PHP Web Application.

Language:PythonStargazers:0Issues:0Issues:0

vulnerability_scanner

Searches for vulnerabilities (CVEs) by estimated CPEs for the installed packages and stores everything inside a sqlite database.

Language:PythonStargazers:0Issues:0Issues:0

web-security-learning-resources

This repository contains list of web security related resources that you can use to gain new skills and extend knowledge

License:GPL-2.0Stargazers:0Issues:0Issues:0

Z0FCourse_ReverseEngineering

Reverse engineering focusing on x64 Windows.

Language:C++License:AGPL-3.0Stargazers:0Issues:1Issues:0