Giter VIP home page Giter VIP logo

📫 Connect with me in your TELEGRAPH ⬇

  @I_am_a_silent_killer

😄 Few Things About Me.

  • 👋 Hi, I’m @Tux-MacG1v
  • 👀 I'm interested in machine learning, cybersecurity, AI, and blockchain.
  • 🌱 I'm presently studying Python and GO programming
  • ⚡ Always learning!

Technologies


Stats

Github stats

Visitors

Tux Macgiver's Projects

a-ultimate-finder icon a-ultimate-finder

This tool is designed to swiftly identify and exploit vulnerabilities within web systems, boasting remarkable speed and efficiency.

aio-bot icon aio-bot

Mass exploiter shell upload scanner 👽

anmol098 icon anmol098

If you are forking please do not forget to star the repo

asnlookup icon asnlookup

Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.

btcd icon btcd

An alternative full node bitcoin implementation written in Go (golang)

ddos icon ddos

ZxCDDoS for education with LAYER 7, LAYER 4, AMP METHODS

django-search-engine icon django-search-engine

Django Search Engine, Scrape links and text from different search engine as mentioned in Readme and Display it.

domainwordsdict icon domainwordsdict

DomainWordsDict, Chinese words dict that contains more than 68 domains, which can be used as text classification、knowledge enhance task。涵盖68个领域、共计916万词的专业词典知识库,可用于文本分类、知识增强、领域词汇库扩充等自然语言处理应用。

exe-to-pdf icon exe-to-pdf

Exe to PDF exploit Builder with 0 detections. Runtime and Scantime

findbb icon findbb

Check if domain has bug bounty program or not

hiddeneyereborn icon hiddeneyereborn

HiddenEye with completely new codebase and better features set, NOT READY FOR END USER, You will be banned for duplicating issue #11 immediately!

ignn icon ignn

[NeurIPS 2020] Cross-Scale Internal Graph Neural Network for Image Super-Resolution

jpg-png-exploit-downloader-fud-cryter-malware-builder-cve-2022 icon jpg-png-exploit-downloader-fud-cryter-malware-builder-cve-2022

We have collectively determined that these vulnerabilities are available to individuals other than the person(s) who discovered them. An unknowable number of people having access to these vulnerabilities makes this a critical issue for everyone using this software.About CVE CVE was launched in 1999 when most information security tools used their own databases with their own names for security vulnerabilities. At that time there was no significant variation among products and no easy way to determine when the different databases were referring to the same problem.Our Developers Our Developer team is highly experienced in various languages and can deliver quality software Exploit JPG fast & reliably. Efficiency is guaranteed.

markdown-badges icon markdown-badges

Badges for your personal developer branding, profile, and projects.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.