Jamilu Abdullahi's repositories

Stargazers:0Issues:0Issues:0

hospitalmanagement

Hospital Management System || Python Django

License:MITStargazers:0Issues:0Issues:0

Hospital-Management-System

The purpose of this project is to computerize the Front Office Management of Hospital by developing a software which is user friendly, simple, fast, and cost– effective. It deals with the collection of patient’s information, diagnosis details, etc.

Stargazers:0Issues:0Issues:0

Hospital-Management-System-Using-Python

Simple python mini project

Stargazers:0Issues:0Issues:0

HospitalManagementSystem

Hospital management System python

Stargazers:0Issues:0Issues:0

sloot

loot source code from sonarqube

License:MITStargazers:0Issues:0Issues:0

at-ps

Adversary Tactics - PowerShell Training

License:NOASSERTIONStargazers:0Issues:0Issues:0

RedTeam-Tactics-and-Techniques

Red Teaming Tactics and Techniques

Stargazers:0Issues:0Issues:0

community

Kubernetes community content

License:Apache-2.0Stargazers:0Issues:0Issues:0

tcpproxy

Intercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic

License:MITStargazers:0Issues:0Issues:0

CheatSheetSeries

The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.

License:NOASSERTIONStargazers:0Issues:0Issues:0

C3

Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

HackTheBox-CTF-Writeups

This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty.

Stargazers:0Issues:0Issues:0

dive-into-machine-learning

Dive into Machine Learning with Python Jupyter notebook and scikit-learn!

License:CC-BY-4.0Stargazers:0Issues:0Issues:0

Virgilio

Your new Mentor for Data Science E-Learning.

Language:Jupyter NotebookLicense:NOASSERTIONStargazers:0Issues:0Issues:0

practicalAI

📚 A practical approach to machine learning.

Language:Jupyter NotebookLicense:MITStargazers:0Issues:0Issues:0

awesome-deep-learning

A curated list of awesome Deep Learning tutorials, projects and communities.

Stargazers:0Issues:0Issues:0

Grouper2

Find vulnerabilities in AD Group Policy

Language:C#License:MITStargazers:0Issues:0Issues:0

AD-Attack-Defense

Attack and defend active directory using modern post exploitation adversary tradecraft activity

Stargazers:0Issues:0Issues:0

Red-Teaming-Toolkit

A collection of open source and commercial tools that aid in red team operations.

License:GPL-3.0Stargazers:0Issues:0Issues:0

100-Days-Of-ML-Code

100 Days of ML Coding

Language:PythonLicense:MITStargazers:0Issues:0Issues:0
Stargazers:1Issues:0Issues:0

data-science-ipython-notebooks

Data science Python notebooks: Deep learning (TensorFlow, Theano, Caffe, Keras), scikit-learn, Kaggle, big data (Spark, Hadoop MapReduce, HDFS), matplotlib, pandas, NumPy, SciPy, Python essentials, AWS, and various command lines.

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0
Language:CStargazers:0Issues:0Issues:0

pingcastle

PingCastle - Get Active Directory Security at 80% in 20% of the time

Language:C#License:NOASSERTIONStargazers:0Issues:0Issues:0

vulnserver

Vulnerable server used for learning software exploitation

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

external_c2_framework

Python api for usage with cobalt strike's External C2 specification

Stargazers:0Issues:0Issues:0

Sn1per

Automated pentest framework for offensive security experts

Language:PHPLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Reconnoitre

A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Language:PHPLicense:MITStargazers:0Issues:0Issues:0