Skip to content
View X-3306's full-sized avatar

Block or report X-3306

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A collection of various awesome resources about quantum mechanics, cryptography, computing, and hacking.

2 Updated May 8, 2024

My attempt at researching Quantum Mechanics & Quantum Computing when I was a junior.

Jupyter Notebook 135 58 Updated Sep 13, 2022

Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code …

198 25 Updated Feb 24, 2022

Several PDF analysis reassembled with additional tips and tools

322 57 Updated May 16, 2023

Out of boredom, I was thinking about how to bypass the security on Claude3, which probably has the best protection "against harmful content". And I came up with the idea that when the AI itself kno…

9 Updated Apr 5, 2024

Guaranteed compile-time string literal obfuscation header-only library for C++14

C++ 1,067 173 Updated Jul 10, 2024

Hello, I just put my Full code of darkweb/hacking news website for everyone, you can change links/photos/names etc. for your own if you want.

HTML 4 Updated Jan 13, 2024

Instant voice cloning by MIT and MyShell.

Python 29,806 2,933 Updated Aug 21, 2024

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

TypeScript 10,468 10,946 Updated Nov 11, 2024

Code for the paper "Language Models are Unsupervised Multitask Learners"

Python 22,529 5,526 Updated Aug 14, 2024

🧮 Path to a free self-taught education in Mathematics!

4,482 457 Updated Oct 8, 2024

📙 Amazon Web Services — a practical guide

Shell 35,742 3,881 Updated Aug 16, 2024

🤖 Python examples of popular machine learning algorithms with interactive Jupyter demos and math being explained

Jupyter Notebook 23,117 4,070 Updated Nov 12, 2024

This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them

7,166 1,371 Updated Sep 25, 2024

A collection of hacking tools, resources and references to practice ethical hacking.

13,411 1,572 Updated Oct 16, 2023

Image Payload Creating/Injecting tools

Perl 1,200 239 Updated Nov 30, 2023

Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.

64,388 6,795 Updated Aug 16, 2024

the hacker sends a binary SMS to the target's phone. The SMS contains a special payload executed by the operating system of the phone's SIM card

27 5 Updated Oct 14, 2023

it is my all notes about topics I've been learned in 4/5 years (mostly hacking)

4 3 Updated Oct 18, 2024

Minimal examples of data structures and algorithms in Python

Python 24,073 4,609 Updated Jul 14, 2024

Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.

PowerShell 1,424 238 Updated Nov 9, 2021

static analysis of C/C++ code

C++ 5,822 1,455 Updated Nov 17, 2024

Example code for the book https://www.nostarch.com/gamehacking . PLEASE READ THE README

C++ 675 236 Updated Sep 24, 2023

Leaked source code of the babuk ransomware by VXUG

C++ 247 147 Updated Sep 11, 2023

VBA Obfuscation Tools combined with an MS office document generator

Python 531 129 Updated Oct 15, 2017

A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.

Python 189 28 Updated Jan 2, 2023

This repository provides code for modulating radio signals based on mechanical vibrations, demodulating received signals to extract information, and processing demodulated signals to produce sound …

C 4 Updated Aug 3, 2023

A collection of the code I have written for my YouTube tutorials.

Jupyter Notebook 275 103 Updated Sep 18, 2024

The "DLLHijack Injection" tool enables the injection of malicious DLLs into target processes, allowing for DLL hijacking attacks. This technique can be used to exploit vulnerable applications by re…

C++ 2 Updated May 20, 2023

Advanced Function Hooking Utility: Seamlessly intercept and manipulate function execution flow. Redirect calls from target functions to custom hooks for dynamic behavior customization with powerful…

C++ 2 Updated May 19, 2023
Next