0xA's repositories
PyCreditCardValidator
Python version of Credit Card Validator. Accepts Credit Card Number and Checks if it's Valid.
caesar-cipher
Caesar Cipher Crypto Web App
personal-security-checklist
đź”’ A curated checklist of 300+ tips for protecting digital security and privacy in 2020
bl4ckbo7-Cipher
bl4ckbo7 Cipher is a Monoalphabetic Substitution Cipher, which can encrypt and decrypt plaintexts.
bl4ckbo7-Password-Gen
bl4ckbo7 Password Generator is a simple Windows cmd-line based program.
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Cloud-DevSecOps-Learning
Collection of Cloud and DevSecOps learning resources
codeql-agent-docker
:floppy_disk: The CodeQL for Docker. It supports static application security testing (SAST).
d2l-en-fork
Interactive deep learning book with multi-framework code, math, and discussions. Adopted at 300 universities from 55 countries including Stanford, MIT, Harvard, and Cambridge.
Deep-learning-ML-and-tensorflow
Examples of linear regression, logistic regression, and deep learning implementations such as Transformers, gans, cnns, rnns, and more using Tensorflow. The code examples here are discussed in my books: Deep Learning Algorithms, and Getting Started with Deep Learning -->> Link.
Digital-Forensics-Guide
Digital Forensics Guide
fido2
Open-source FIDO server, featuring the FIDO2 standard. https://demo4.strongkey.com/getstarted/#/openapi/fido
free-programming-books
:books: Freely available programming books
hackerone-reports
Top disclosed reports from HackerOne
machine_learning_security
Source code about machine learning and security.
ML-Cybersecurity
Machine Learning for Cybersecurity Certificate Course at UChicago
oscp
OSCP preparation tools, scripts and cheatsheets
paper_collection
Academic papers related to fuzzing, binary analysis and exploit dev, that I want to read or have already read
papers-we-love
Papers from the computer science community to read and discuss.
Practical-Cryptography-for-Developers-Book
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
SigFramework
SigFramework it's a modified version of SiGploit
trojan-source
Trojan Source: Invisible Vulnerabilities
weaponised-XSS-payloads
XSS payloads designed to turn alert(1) into P1
webshell
This is a webshell open source project
WordList-Compendium
Personal compilation of wordlists & dictionaries for everything. Users, passwords, directories, files, vulnerabilities, fuzzing, injections, wordlists of tools, etc.