Stars
This repository contains scripts in python from discovering bluetooth to taking over the bluetooth connections.
This page will contain all the links to the script and exploits built from scratch in python as well as c code.
This repository contains the python script which will scrap the google to download images .
This repository contains the python script which will help to steal the wifi password stored only in windows machine .
This repository contains the code of backdoor which can be used to exploit victim's machine ,we can download /upload /execute commands on victims machine from our machine .
Tcp proxy we can forward the traffic from host to host as well as useful when assessing network based software.
script to sniff packets in python using scape
The repo contains a c program to perform dictionary attack with help of wordlist which contains the words and a hash which needs to be cracked.
android methods are hard to remember so here is the cheat sheet to make development process faster.
This repository will contain the explanation and implementation of DSA algorithms along with some applications in c and python
Repository contains the Script to sign the message as well as verify the message using openssl with python
Artificial neural network from scratch
Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then again logIn.
This is a repository contains all the basic implementation of C programs and also feel free to contribute as well , as i will be uploading dataStructure with seperately
This repository is all about implementation of basic concepts of linux system programming ,which willl help programmer to refresh their concepts or will help noobs to see how theoretical concepts w…
This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting , network sniffing ,network cracking ,brute forcing and MITM…
webscraper which scraps the links using Jsoup in java
This repo explains the process of sandboxing with python as It is a computer security term reffering to when a program in set aside from other progams in a seprate environment so that if errors or …
This script will take screenshot and save it to the specified location . you can either use it in building trojans or you can use some other ways please.
This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipboard and appends them in the keylogs file
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which …