Mohamad Shikh Mhd's repositories
Algorithm-Data-Structures-Python
Various useful data structures in Python
awesome-bugbounty-tools
A curated list of various bug bounty tools
awesome-vulnerable-apps
Awesome Vulnerable Applications
Design-Analysis-of-Algorithms
Some C codes, for my Design and Analysis of Algorithms. Lab and Home Work
food-nutrients
:fork_and_knife: Food Nutrients
hugo-PaperMod
A fast, clean, responsive Hugo theme.
subnet_calculator
A simple CIDR/VLSM Calculator written with HTML & JS.
tlopasha.github.io
Beautiful portfolio style template for jekyll
IMSI-catcher
This program show you IMSI numbers of cellphones around you.
iva
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
KubernetesLabs
K8S Walkthrough code samples
PENTESTING-BIBLE
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
python-pentest-tools
Python tools for penetration testers
Reverse-Engineering
Reverse Engineering
RexCrypter
Crypter made in C#. Nearly FUD. Detection rate 2/38
Screenshot-to-code
A neural network that transforms a design mock-up into a static website.
SecConArchive
Security Conference Archive
the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
tudo
TUDO - A vulnerable PHP Web Application.
vulnerability_scanner
Searches for vulnerabilities (CVEs) by estimated CPEs for the installed packages and stores everything inside a sqlite database.
web-security-learning-resources
This repository contains list of web security related resources that you can use to gain new skills and extend knowledge
Z0FCourse_ReverseEngineering
Reverse engineering focusing on x64 Windows.