Pinned Repositories
Algorithm-Data-Structures-Python
Various useful data structures in Python
awesome-bugbounty-tools
A curated list of various bug bounty tools
awesome-vulnerable-apps
Awesome Vulnerable Applications
Design-Analysis-of-Algorithms
Some C codes, for my Design and Analysis of Algorithms. Lab and Home Work
food-nutrients
:fork_and_knife: Food Nutrients
frontend
Frontend UI for Dependency-Track
hugo-PaperMod
A fast, clean, responsive Hugo theme.
subnet_calculator
A simple CIDR/VLSM Calculator written with HTML & JS.
tlopasha.github.io
Beautiful portfolio style template for jekyll
Tlopasha's Repositories
Tlopasha/Algorithm-Data-Structures-Python
Various useful data structures in Python
Tlopasha/awesome-bugbounty-tools
A curated list of various bug bounty tools
Tlopasha/awesome-vulnerable-apps
Awesome Vulnerable Applications
Tlopasha/Design-Analysis-of-Algorithms
Some C codes, for my Design and Analysis of Algorithms. Lab and Home Work
Tlopasha/food-nutrients
:fork_and_knife: Food Nutrients
Tlopasha/frontend
Frontend UI for Dependency-Track
Tlopasha/hugo-PaperMod
A fast, clean, responsive Hugo theme.
Tlopasha/subnet_calculator
A simple CIDR/VLSM Calculator written with HTML & JS.
Tlopasha/tlopasha.github.io
Beautiful portfolio style template for jekyll
Tlopasha/IMSI-catcher
This program show you IMSI numbers of cellphones around you.
Tlopasha/iva
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
Tlopasha/Kage
Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler
Tlopasha/OSCP
Materials for OSCP exam
Tlopasha/OSCP-2
Collection of things made during my OSCP journey
Tlopasha/PENTESTING-BIBLE
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
Tlopasha/python-pentest-tools
Python tools for penetration testers
Tlopasha/Reverse-Engineering
Reverse Engineering
Tlopasha/RexCrypter
Crypter made in C#. Nearly FUD. Detection rate 2/38
Tlopasha/Screenshot-to-code
A neural network that transforms a design mock-up into a static website.
Tlopasha/SecConArchive
Security Conference Archive
Tlopasha/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Tlopasha/tudo
TUDO - A vulnerable PHP Web Application.
Tlopasha/vulnerability_scanner
Searches for vulnerabilities (CVEs) by estimated CPEs for the installed packages and stores everything inside a sqlite database.
Tlopasha/web-security-learning-resources
This repository contains list of web security related resources that you can use to gain new skills and extend knowledge
Tlopasha/Z0FCourse_ReverseEngineering
Reverse engineering focusing on x64 Windows.