Pinned Repositories
100-Days-Of-ML-Code
100 Days of ML Coding
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
at-ps
Adversary Tactics - PowerShell Training
awesome-deep-learning
A curated list of awesome Deep Learning tutorials, projects and communities.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
awesome-infosec
A curated list of awesome infosec courses and training resources.
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
beef
The Browser Exploitation Framework Project
GOLD-MINE
Markdown-XSS-Payloads
XSS payloads for exploiting Markdown syntax
itz-jameel's Repositories
itz-jameel/GOLD-MINE
itz-jameel/100-Days-Of-ML-Code
100 Days of ML Coding
itz-jameel/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
itz-jameel/at-ps
Adversary Tactics - PowerShell Training
itz-jameel/awesome-deep-learning
A curated list of awesome Deep Learning tutorials, projects and communities.
itz-jameel/C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
itz-jameel/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
itz-jameel/community
Kubernetes community content
itz-jameel/data-science-ipython-notebooks
Data science Python notebooks: Deep learning (TensorFlow, Theano, Caffe, Keras), scikit-learn, Kaggle, big data (Spark, Hadoop MapReduce, HDFS), matplotlib, pandas, NumPy, SciPy, Python essentials, AWS, and various command lines.
itz-jameel/dive-into-machine-learning
Dive into Machine Learning with Python Jupyter notebook and scikit-learn!
itz-jameel/dostackbufferoverflowgood
itz-jameel/external_c2_framework
Python api for usage with cobalt strike's External C2 specification
itz-jameel/Grouper2
Find vulnerabilities in AD Group Policy
itz-jameel/HackTheBox-CTF-Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty.
itz-jameel/Hospital-Management-System
The purpose of this project is to computerize the Front Office Management of Hospital by developing a software which is user friendly, simple, fast, and cost– effective. It deals with the collection of patient’s information, diagnosis details, etc.
itz-jameel/Hospital-Management-System-Using-Python
Simple python mini project
itz-jameel/hospitalmanagement
Hospital Management System || Python Django
itz-jameel/HospitalManagementSystem
Hospital management System python
itz-jameel/itz-jameel
itz-jameel/pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
itz-jameel/practicalAI
📚 A practical approach to machine learning.
itz-jameel/Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
itz-jameel/Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
itz-jameel/RedTeam-Tactics-and-Techniques
Red Teaming Tactics and Techniques
itz-jameel/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
itz-jameel/sloot
loot source code from sonarqube
itz-jameel/Sn1per
Automated pentest framework for offensive security experts
itz-jameel/tcpproxy
Intercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic
itz-jameel/Virgilio
Your new Mentor for Data Science E-Learning.
itz-jameel/vulnserver
Vulnerable server used for learning software exploitation