p-g-krish's Stars
TheAlgorithms/Python
All Algorithms implemented in Python
josephmisiti/awesome-machine-learning
A curated list of awesome Machine Learning frameworks, libraries and software.
awesomedata/awesome-public-datasets
A topic-centric list of HQ open datasets.
iperov/DeepFaceLive
Real-time face swap for PC streaming or video calls
iperov/DeepFaceLab
DeepFaceLab is the leading software for creating deepfakes.
jtoy/awesome-tensorflow
TensorFlow - A curated list of dedicated resources http://tensorflow.org
kjw0612/awesome-deep-vision
A curated list of deep learning resources for computer vision
ravynsoft/ravynos
A BSD-based OS project that aims to provide source and binary compatibility with macOS® and a similar user experience.
tomnomnom/waybackurls
Fetch all the URLs that the Wayback Machine knows about for a domain
odedshimon/BruteShark
Network Analysis Tool
espruino/Espruino
The Espruino JavaScript interpreter - Official Repo
mrd0x/BITB
Browser In The Browser (BITB) Templates
ZitaoTech/Hackberry-Pi_Zero
A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4" 720X720 TFT display
randorisec/MobileHackingCheatSheet
Basics on commands/tools/info on how to assess the security of mobile applications
Ge0rg3/requests-ip-rotator
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
alephsecurity/xnu-qemu-arm64
projectdiscovery/public-bugbounty-programs
Community curated list of public bug bounty and responsible disclosure programs.
Ignitetechnologies/Vulnhub-CTF-Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
synesthesiam/voice2json
Command-line tools for speech and intent recognition on Linux
facebookresearch/fairo
A modular embodied agent architecture and platform for building embodied agents
shadawck/awesome-anti-forensic
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
MycroftAI/enclosure-picroft
Mycroft interface for Raspberry Pi environment
penk/MainboardTerminal
A Retro-style Computer with a Modern Core
Ralireza/Android-Security-Teryaagh
Android security guides, roadmap, docs, courses, write-ups, and teryaagh.
gradio-app/openai-gradio
mrexodia/perfect-dll-proxy
Perfect DLL Proxying using forwards with absolute paths.
hardenedvault/bootkit-samples
Bootkit sample for firmware attack
Neo23x0/god-mode-rules
God Mode Detection Rules
NextronSystems/thor-lite
Fast IOC and YARA Scanner
Hamz-a/boring-flutter