Popular repositories Loading
-
Brutal
Brutal PublicForked from screetsec/Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powe…
Arduino 1
-
datoscentral
datoscentral PublicRegistrador de datos autosincronizados entre Android SQLite y MySQL Server
-
-
magspoof
magspoof PublicForked from samyk/magspoof
MagSpoof is a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers.
Eagle
-
free-programming-books
free-programming-books PublicForked from EbookFoundation/free-programming-books
📚 Freely available programming books
-
Probabilistic-Programming-and-Bayesian-Methods-for-Hackers
Probabilistic-Programming-and-Bayesian-Methods-for-Hackers PublicForked from CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers
aka "Bayesian Methods for Hackers": An introduction to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view. All in pure Python ;)
Jupyter Notebook
If the problem persists, check the GitHub status page or contact support.