Pinned Repositories
agt
Advanced Git Tool - Agt, is a commandline advanced git tool for searching and querying information about repositories as well as cloning with fastest and parallel clone processing feature.
ASCII-BINARY-CONVERTER
Pure C++ Application that converts ASCII characters to BINARY.
bl4ckbo7-Cipher
bl4ckbo7 Cipher is a Monoalphabetic Substitution Cipher, which can encrypt and decrypt plaintexts.
bl4ckbo7-Password-Gen
bl4ckbo7 Password Generator is a simple Windows cmd-line based program.
caesar-cipher
Caesar Cipher Crypto Web App
CreditCardNumberGenerator-v1.0.4.16
Simple Credit Card Number Generator. Coded in Purely C++.
hackerone-reports
Top disclosed reports from HackerOne
personal-security-checklist
🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2020
PyCreditCardValidator
Python version of Credit Card Validator. Accepts Credit Card Number and Checks if it's Valid.
bl4ckbo7's Repositories
bl4ckbo7/agt
Advanced Git Tool - Agt, is a commandline advanced git tool for searching and querying information about repositories as well as cloning with fastest and parallel clone processing feature.
bl4ckbo7/PyCreditCardValidator
Python version of Credit Card Validator. Accepts Credit Card Number and Checks if it's Valid.
bl4ckbo7/caesar-cipher
Caesar Cipher Crypto Web App
bl4ckbo7/personal-security-checklist
🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2020
bl4ckbo7/bl4ckbo7-Cipher
bl4ckbo7 Cipher is a Monoalphabetic Substitution Cipher, which can encrypt and decrypt plaintexts.
bl4ckbo7/bl4ckbo7-Password-Gen
bl4ckbo7 Password Generator is a simple Windows cmd-line based program.
bl4ckbo7/hackerone-reports
Top disclosed reports from HackerOne
bl4ckbo7/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
bl4ckbo7/Mobile-App-Pentest
bl4ckbo7/Cloud-DevSecOps-Learning
Collection of Cloud and DevSecOps learning resources
bl4ckbo7/codeql-agent-docker
:floppy_disk: The CodeQL for Docker. It supports static application security testing (SAST).
bl4ckbo7/d2l-en-fork
Interactive deep learning book with multi-framework code, math, and discussions. Adopted at 300 universities from 55 countries including Stanford, MIT, Harvard, and Cambridge.
bl4ckbo7/Deep-learning-ML-and-tensorflow
Examples of linear regression, logistic regression, and deep learning implementations such as Transformers, gans, cnns, rnns, and more using Tensorflow. The code examples here are discussed in my books: Deep Learning Algorithms, and Getting Started with Deep Learning -->> Link.
bl4ckbo7/Digital-Forensics-Guide
Digital Forensics Guide
bl4ckbo7/fido2
Open-source FIDO server, featuring the FIDO2 standard. https://demo4.strongkey.com/getstarted/#/openapi/fido
bl4ckbo7/free-programming-books
:books: Freely available programming books
bl4ckbo7/machine_learning_security
Source code about machine learning and security.
bl4ckbo7/ML-Cybersecurity
Machine Learning for Cybersecurity Certificate Course at UChicago
bl4ckbo7/Notification
bl4ckbo7/oscp
OSCP preparation tools, scripts and cheatsheets
bl4ckbo7/paper_collection
Academic papers related to fuzzing, binary analysis and exploit dev, that I want to read or have already read
bl4ckbo7/papers-we-love
Papers from the computer science community to read and discuss.
bl4ckbo7/pe_tree
bl4ckbo7/Practical-Cryptography-for-Developers-Book
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
bl4ckbo7/reports
bl4ckbo7/SigFramework
SigFramework it's a modified version of SiGploit
bl4ckbo7/trojan-source
Trojan Source: Invisible Vulnerabilities
bl4ckbo7/weaponised-XSS-payloads
XSS payloads designed to turn alert(1) into P1
bl4ckbo7/webshell
This is a webshell open source project
bl4ckbo7/WordList-Compendium
Personal compilation of wordlists & dictionaries for everything. Users, passwords, directories, files, vulnerabilities, fuzzing, injections, wordlists of tools, etc.