You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
AntiCCScam is a Python script that combats credit card fraud by sending fake data to scam websites, disrupting their malicious operations. This tool generates and automates the flooding of scam sites with random credit card information for educational and ethical purposes.
Kali Web Application Attacks in Action | This repo collects 2 of programming labs exercises for Kali Web Application Attacks in Action. In this course, you will learn how to perform web application attacks using Kali Linux. Topics covered include web penetration testing, discovering web vulnerabi...
Welcome to my portfolio showcase, a reflection of my journey in the dynamic realm of digital security. I am dedicated to upholding the highest standards of professionalism and expertise. This page serves as a testament to my growth through various Projects and Capture the Flag (CTF) challenges.
Privilege Escalation Techniques on Linux | This repo collects 11 of programming labs exercises for Privilege Escalation Techniques on Linux. In this course, you will learn about privilege escalation techniques on Linux. It is a beginner level course and will cover various techniques to escalate p...
Kali Server Exploitation in Action | This repo collects 20 of programming labs exercises for Kali Server Exploitation in Action. This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting networ...