RAJ TOMAR's repositories
data_books
data books i have collected
Awesome-Hacking-Tools
Awesome Hacking Tools
awesome-hacking
Awesome hacking is an awesome collection of hacking tools.
Awesome-Hacking-1
A collection of various awesome lists for hackers, pentesters and security researchers
computer-science
:mortar_board: Path to a free self-taught education in Computer Science!
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Auto-GPT
An experimental open-source attempt to make GPT-4 fully autonomous.
automate_python
revision of python basics
awesome-solidity
⟠ A curated list of awesome Solidity resources, libraries, tools and more
awesome-system-design
A curated list of awesome System Design (A.K.A. Distributed Computing) resources.
capstone
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
developer-roadmap
Roadmap to becoming a web developer in 2020
dissect
Code for the Proceedings of the National Academy of Sciences 2020 article, "Understanding the Role of Individual Units in a Deep Neural Network"
hello-world
learning github
how-to-secure-anything
How to systematically secure anything: a repository about security engineering
intermediate-python-course
an intermediate Python course
L3MON
L3MON - Remote Android Managment Suite
ml-model-django
Deploy Machine Learning Models with Django
opensource-chatbot
A chatbot for candidates whose data processing will exclusively take place on in-house servers in the future. Based on Rasa NLU and Rasa Core
patchwork
All the Git-it Workshop completers!
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
programming-math-science
This is a list of links to different freely available learning resources about computer programming, math, and science.
prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls listed here https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf and more than 100 additional checks that help on GDPR, HIPAA and other security requirements.
qark
Tool to look for several security related Android application vulnerabilities
software-Design
Learn and apply Program and function design
static_site
testing how github publish website online
vpnrotator
The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware traffic from different geolocations.