Pinned Repositories
3x-ui
Xray panel supporting multi-protocol multi-user expire day & traffic & ip limit (Vmess & Vless & Trojan & ShadowSocks)
Algorithmic-Trading
all of my own strategy to use as crypto bot
ATA-Finance
ATAMOMS
config-data
CRM
cupper-en
advanced version of common user password profiler(CUPP)
Hiddify-Manager
multi-user anti-filtering panel, with an effortless installation and supporting more than 20 protocols to circumvent filtering plus the telegram proxy.
Image-classification
Build a deep learning model that can recognize and classify images. You can use popular datasets like CIFAR-10 or MNIST and frameworks like TensorFlow or PyTorch.
Invest
Create some tools for find investing opportunity.
atakhadivi's Repositories
atakhadivi/Algorithmic-Trading
all of my own strategy to use as crypto bot
atakhadivi/3x-ui
Xray panel supporting multi-protocol multi-user expire day & traffic & ip limit (Vmess & Vless & Trojan & ShadowSocks)
atakhadivi/ATA-Finance
atakhadivi/ATAMOMS
atakhadivi/config-data
atakhadivi/CRM
atakhadivi/cupper-en
advanced version of common user password profiler(CUPP)
atakhadivi/Hiddify-Manager
multi-user anti-filtering panel, with an effortless installation and supporting more than 20 protocols to circumvent filtering plus the telegram proxy.
atakhadivi/Image-classification
Build a deep learning model that can recognize and classify images. You can use popular datasets like CIFAR-10 or MNIST and frameworks like TensorFlow or PyTorch.
atakhadivi/Invest
Create some tools for find investing opportunity.
atakhadivi/invest-opportunity-finder
This repository is for educational purpose and I want to create complete invest advisor.
atakhadivi/My-Python-Practice
atakhadivi/passlist-generator
i see many password in my clients they use their name and lastname or use pet name ID card number or phone number i write this script ask you for their data and merge theme together
atakhadivi/psychobook
atakhadivi/Python-Finance
atakhadivi/SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.