Skip to content
View bipbop-sadrobot's full-sized avatar
Block or Report

Block or report bipbop-sadrobot

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

From the Transistor to the Web Browser, a rough outline for a 12 week course

4,994 416 Updated Oct 12, 2021

Pure python3 implementation for working with iDevices (iPhone, etc...).

Python 1,181 162 Updated Jul 11, 2024

Process Ghosting Tool

C++ 165 24 Updated Jun 22, 2021

💻📖 Laws, Theories, Principles and Patterns that developers will find useful. #hackerlaws

Shell 25,658 1,505 Updated Jun 12, 2024

WiFi Penetration Testing & Auditing Tool

Python 299 29 Updated Jun 28, 2024

Pentester's Promiscuous Notebook. Use your Ctrl-F to navigate around

3 Updated Jan 10, 2021

aka "Bayesian Methods for Hackers": An introduction to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view. All in pure Python ;)

Jupyter Notebook 26,512 7,837 Updated Jun 25, 2024

Always Keep Learning

C++ 45 16 Updated Apr 14, 2022

PSA/Stellantis (Peugeot, Citroen, DS, Opel) NAC / RCC / CIROCCO Configuration softwares - Telecoding / Calibration

70 20 Updated Jul 3, 2024

Performance Monitor for cars with Android Auto

Kotlin 271 14 Updated Feb 25, 2024

Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code

C 279 126 Updated Jan 13, 2021

[Unofficial] Tiny Linux distribution for TomTom™ devices

C 22 4 Updated Apr 24, 2021

Tool suite tinder.

JavaScript 6 2 Updated Nov 22, 2022

Mined data from Twitter and classify the users based on their locations and preferences to target them through marketing campaigns.

Jupyter Notebook 12 2 Updated Dec 27, 2020

Panel Social Media Marketing of Open Source

PHP 75 33 Updated Aug 1, 2022

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

C 9,129 2,240 Updated Mar 17, 2024

Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.

C 39 6 Updated Jun 21, 2024

SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.

Python 347 46 Updated Jun 21, 2024

A comprehensive collection of CyberSecurity PDFs. Guides, Research Papers, Education, Information Security, Network Security, Cryptography, Malware Analysis, Penetration Testing, Ethical Hacking, D…

5 Updated Apr 12, 2024

💡 Download the complete source code of any website (including all assets). [ Javascripts, Stylesheets, Images ] using Node.js

HTML 1,483 503 Updated Jul 11, 2024

Web hacking framework with tools, exploits by python

Python 313 66 Updated Dec 8, 2022

ALL IN ONE Hacking Tool For Hackers

Python 43,518 4,791 Updated Jun 25, 2024

An advanced multithreaded admin panel finder written in python.

Python 702 247 Updated May 17, 2024

TwtBoard is world's first free and open source desktop based twitter marketing, management and analytics software.

C# 26 17 Updated Oct 17, 2015

TweetSploit - Is a twitter Marketing Suite allowing for a nice and simple interface, from which you can access and automate Twitter marketing with ease.

Python 21 5 Updated May 18, 2016

A checklist of tactics for marketing your startup.

5,426 524 Updated Nov 8, 2021

Automated Linux evil maid attack

Python 419 80 Updated Dec 22, 2015

Scripts that will make you go WOW!

Python 1,452 494 Updated May 14, 2024
PHP 3,326 587 Updated Mar 14, 2024
Next