Stars
The scripts helps security analsts to identify misconfigured firebase instances.
Revamped portfolio site built with React with Parallax, React Three Fibre, Tailwind and a bunch of other stuff :D
🤗 Transformers: State-of-the-art Machine Learning for Pytorch, TensorFlow, and JAX.
Desktop application for managing a hairdressing salon. Final project in Object-Oriented Programming subject on studies
Projekt na zaliczenie z przedmiotu programowanie obiektowe.
An implementation of a quantum random number generator using the Qiskit integrated into a Flask web application. Allows users to generate random numbers and visualise the distribution through a gra…
A curated list of CTF frameworks, libraries, resources and softwares
Apple BLE proximity pairing message spoofing
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Sentiment Analysis Python script using NLP (NLTK's VADER model) tool that analyses text data and labels them with sentiment scores.
Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourceforge.net/
FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for mass hunting bug bounties and for penetration testing.
A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "wr…
The Best Practices for OSS Developers working group is dedicated to raising awareness and education of secure code best practices for open source developers.
A community collection of security reviews of open source software components.
rsatool can be used to calculate RSA and RSA-CRT parameters
Generative Models by Stability AI
A (formerly) comprehensive guide to installing Coreboot on various laptops.
Python script that simulates the Blowfish algorithm in the Cipher Block Chaining (CBC) mode
Python code that simulates the Elliptic Curve Digital Signature Algorithm (ECDSA)
BB84 QKD simulation using the Python Qiskit library with various options: Simulation of a perfect implementation, low error rate, high error rate, and the presence of an eavesdropper.
Challenge files for Nullsec's Introduction to OSINT workshop! Password will be released during the workshop :D
Streamlining processes, fixing issues, other stuff for Linux systems :)