• Stars
    star
    1
  • Language
    Shell
  • Created 5 months ago
  • Updated 5 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

exploit the vulnerability with Shodan in Metasploit and use Sodan in the terminal.

More Repositories

1

traduction_francais_fulfude

Un mini programme de traduction de français vers fulfuldé
Java
6
star
2

fastApiGlish1

create ChatGPT openai api with FASTAPI
Python
4
star
3

data-analysis

Analyse des données de référence avec le langage R. Maîtrise statistique de l'analyse des données, y compris la visualisation des données de base, les tests statistiques et l'inférence, ainsi que la modélisation linéaire
R
4
star
4

EPSIntegrityAlgorithm

Algorithm EIA (EPS Integrity Algorithm)
Python
3
star
5

traduction_par_dictionnaires_python

Python
3
star
6

e-campus

Private
HTML
3
star
7

wadjonautes

3
star
8

samglish

3
star
9

IncSamglish

Private project
HTML
3
star
10

MiniTradosGo

mini traducteur avec golang
Go
2
star
11

mini_traducteur_kotlin

Kotlin
2
star
12

secu_02

Shell
2
star
13

MiniBanque

Une petite banque en ligne
Java
2
star
14

EpsEncryptionAlgorithm

EEA : EPS Encryption Algorithm
Python
2
star
15

secu_01

Shell
2
star
16

SecureShell

secure communications with SSH
Shell
2
star
17

ASLR_DEP_BitNX

Protection ASLR, Bit NX, DEP, SafeSEH, Kernel patches and Safe coding
Shell
1
star
18

Andal-IA

Chat box with Open AI, kotlin
Kotlin
1
star
19

Secu_03

Vulnerability
Shell
1
star
20

scikit-learn

Handwritten digit recognition with scikit-learn
Jupyter Notebook
1
star
21

web_exploitation_scanning

Ethical Hacking - We will use a range of tools to discover application failures.
1
star
22

Gemini_API

Python
1
star
23

Botnets

Ehical Hacking - create a zombie computer network
1
star
24

PentestIntro

Test de pénétration
Shell
1
star
25

ServerSide

Ethical Hacking- vulnerability scanning
Python
1
star
26

AsignalM

Network signal in an area.
Jupyter Notebook
1
star
27

technicalDos

Ethical Hacking - Dos attacks on different services.
1
star
28

bufferOverflow

Application Vulnerability
C
1
star
29

formatString

Particular vulnerability to study
C
1
star
30

BruteForcing

Method used in cryptanalysis to find a password or key.
1
star
31

SocialEngineeringToolkit

Social Engineering Toolkit
1
star
32

EthicalHackingUsefulLinks

useful links in cybersecurity
1
star