Skip to content
View HarshJain-29's full-sized avatar
😇
😇
Block or Report

Block or report HarshJain-29

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 10,437 1,290 Updated Jul 21, 2024

Windows / Linux Local Privilege Escalation Workshop

Batchfile 1,829 460 Updated Oct 9, 2022

ISC2-CC-Study-Material

755 293 Updated Mar 11, 2024

Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).

570 99 Updated Jun 23, 2024

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …

5,546 587 Updated Jul 21, 2024

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 58,733 14,277 Updated Jul 28, 2024

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 55,945 23,583 Updated Jul 29, 2024

List of Computer Science courses with video lectures.

66,112 9,017 Updated Jul 25, 2024

Full reference of LinkedIn answers 2024 for skill assessments (aws-lambda, rest-api, javascript, react, git, html, jquery, mongodb, java, Go, python, machine-learning, power-point) linkedin excel t…

28,322 13,381 Updated Jul 26, 2024

Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capt…

C++ 790 192 Updated Apr 11, 2024

Interactive roadmaps, guides and other educational content to help developers grow in their careers.

TypeScript 284,309 37,811 Updated Jul 29, 2024

rsatool can be used to calculate RSA and RSA-CRT parameters

Python 1,136 223 Updated Mar 22, 2022

RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data

Python 5,411 895 Updated Jul 29, 2024

This MATLAB and Simulink Challenge Project Hub contains a list of research and design project ideas. These projects will help you gain practical experience and insight into technology trends and in…

MATLAB 1,170 262 Updated Jun 3, 2024

Curated list of project-based tutorials

187,749 24,518 Updated Jul 29, 2024

Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.

Python 2,027 438 Updated Apr 20, 2024

A suite of hospital security tools to defend hospitals against digital attacks/cyber attacks and to promote better hospital security.

C 5 2 Updated Sep 9, 2021

List of beginner-friendly | first-timers-only | up-for-grabs issues (repositories) for Hacktoberfest 2020 | Submit 4 PRs to earn a T-shirt

244 77 Updated Sep 30, 2021

Password strength and validation

Python 74 15 Updated Jun 5, 2020