abdulbasidh
I turn ideas into sleek apps and solve mind-boggling algorithms. Join me on this coding adventure! Grab a virtual seat and let's create digital magic together!
Chennai
abdulbasidh's Stars
abdulbasidh/Confygre-Database
themesberg/landwind
Responsive and clean landing page built with Tailwind CSS and Flowbite
sagiodev/stable-video-diffusion-img2vid
TruDan/dbdiagram-oss
Open-Source Implementation of the great dbdiagram.io
azimuttapp/azimutt
Explore, document and optimize any database
josephnhtam/live-streaming-server-net
A .NET implementation of RTMP live streaming server, supporting HTTP-FLV, WebSocket-FLV, HLS, Kubernetes, cloud storage services integration and more.
unblocktorrents/YTS-YIFY-Proxy
YTS Proxy - 100% Working YTS Mirror Sites 2024
zephyrproject-rtos/zephyr
Primary Git Repository for the Zephyr Project. Zephyr is a new generation, scalable, optimized, secure RTOS for multiple hardware architectures.
neuml/txtai
💡 All-in-one open-source embeddings database for semantic search, LLM orchestration and language model workflows
openchatai/copilot
🤖 🔥 Language-to-actions engine
iperov/DeepFaceLive
Real-time face swap for PC streaming or video calls
VedankPurohit/LiveRecall
Welcome to **LiveRecall**, the open-source alternative to Microsoft's Recall. LiveRecall captures snapshots of your screen and allows you to recall them using natural language queries, leveraging semantic search technology. For added security, all images are encrypted.
upscayl/upscayl
🆙 Upscayl - #1 Free and Open Source AI Image Upscaler for Linux, MacOS and Windows.
massgravel/Microsoft-Activation-Scripts
Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
Tyrrrz/YoutubeDownloader
Downloads videos and playlists from YouTube
coqui-ai/TTS
🐸💬 - a deep learning toolkit for Text-to-Speech, battle-tested in research and production
pilwon/node-yahoo-finance
Yahoo Finance historical quotes and snapshot data downloader written in Node.js
mendel5/alternative-front-ends
Overview of alternative open source front-ends for popular internet platforms (e.g. YouTube, Twitter, etc.)
nefarius/ViGEm.NET
.NET bindings for the ViGEmClient library.
nefarius/ViGEmBus
Windows kernel-mode driver emulating well-known USB game controllers.
Ryochan7/DS4Windows
Like those other ds4tools, but sexier
priyankgada/The-Complete-Practical-Certified-Ethical-Hacking-Course-in-English
Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts! This course is highly practical but it won't neglect the theory, so we'll start with ethical hacking basics and the different fields in penetration testing, installing the needed software (works on Windows, Linux and Mac OS X) and then we'll dive and start hacking systems straight away. From here onwards you'll learn everything by example, by analysing and exploiting computer systems such as networks, servers, clients, websites .....etc, so we'll never have any boring dry theoretical lectures. The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses and hack into it, not only that but you'll also learn how to secure this system from the discussed attacks. This course will take you from a beginner to a more advanced level by the time you finish, you will have knowledge about most penetration testing fields. The course is divided into four main sections: 1. Network Hacking - This section will teach you how to test the security of networks, both wired and wireless. First, you will learn some basic network terminology, how networks work, and how devices communicate with each other. Then it will branch into three sub sections: Pre-connection attacks: in this subsection you'll learn what can you do before even connecting to a network, and even before having internet access; you'll start by learning how to gather information about the networks around you, discover the devices connected to them, and how to control connections around you (ie: deny/allow devices from connecting to networks) even without knowing the password of the target network. Gaining Access: Now that you gathered information about the networks around you, in this subsection you will learn how to crack the key and get the password to your target network weather it uses WEP, WPA or even WPA2. Post Connection attacks: Now that you have the key, you can connect to the target network, in this subsection you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and much more! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients. 2. Gaining Access - In this section you will learn two main approaches to gain full control or hack computer systems: Server Side Attacks: In this subsection you will learn how to gain full access to computer systems without the need for user interaction. You will learn how to gather useful information about a target computer system such as its operating system, open ports, installed services, then you'll learn how to use this information to discover weaknesses and vulnerabilitiesand exploit them to gain full control over the target. Finally you will learn how to generate different types of reports for your discoveries. Client Side Attacks - If the target system does not contain any weaknesses then the only way to gain access to it is by interacting with the users, in this subsection you'll learn how to get the target user to install a backdoor on their system without even realising, this is done by hijacking updatesor backdoornig downloadeds on the fly. Not only that but you'll also learn how to create trojans by backdooring normal files (such as an image or a pdf) and use social engineering to deliver this trojan to the target, to do this you'll learn how to spoof emails so they appear as if they're sent from the target's friend, boss or any email account they're likely to interact with. 3. Post Exploitation - In this section you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target and even use the target computer as a pivot to hack other computer systems. 4. Website / Web Application Hacking - In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the following dangerous vulnerabilities to hack into websites:
krishnadey30/LeetCode-Questions-CompanyWise
Contains Company Wise Questions sorted based on Frequency and all time
MaxRev-Dev/gamepad
A SNES gamepad controller with debouncer using SharpDX (DirectX) written for .netstandard2.0
DevDecoder/HIDDevices
Cross-platform .NET Standard library for asynchronous controller input reading (e.g. gamepads, joysticks, etc.)
fawaz404dev/Gigaland-NFT-Marketplace
Gigaland is a responsive, pixel-perfect, and the most complete template for NFTS marketplace, crypto-collectibles, digital items, non-fungible tokens websites, and more. Gigaland has a lot of styles and elements to help you make beauty and modern website in no time. Gigaland is built with modern technologies like HTML5, CSS3, jQuery, Bootstrap 5, CSS3 Animation, and more. we ensure you will always get top-notch products from us.
pa7/heatmap.js
🔥 JavaScript Library for HTML5 canvas based heatmaps
rrweb-io/rrweb
record and replay the web
KRTirtho/spotube
🎧 Open source Spotify client that doesn't require Premium nor uses Electron! Available for both desktop & mobile!
red-prig/fpPS4
PS4 compatibility layer (emulator) on Free Pascal