All Projects → urcuqui → Whitehat

urcuqui / Whitehat

Information about my experiences on ethical hacking 💀

Programming Languages

python
139335 projects - #7 most used programming language
r
7636 projects

Projects that are alternatives of or similar to Whitehat

Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+2468.52%)
Mutual labels:  research, hacking, hacker
Daily Neural Network Practice 2
Daily Dose of Neural Network that Everyone Needs
Stars: ✭ 18 (-66.67%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms
Machine learning refined
Notes, examples, and Python demos for the textbook "Machine Learning Refined" (published by Cambridge University Press).
Stars: ✭ 750 (+1288.89%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms
Innovative Hacktober
Make a pull request. Let's hack the ocktober in an innovative way.
Stars: ✭ 34 (-37.04%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+1155.56%)
Mutual labels:  hacking, hacker
Research
Notebooks based on financial machine learning.
Stars: ✭ 714 (+1222.22%)
Mutual labels:  jupyter-notebook, research
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+1494.44%)
Mutual labels:  hacking, hacker
Solr Injection
Apache Solr Injection Research
Stars: ✭ 464 (+759.26%)
Mutual labels:  research, hacking
Bipropagation
Stars: ✭ 41 (-24.07%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms
Openpmd Viewer
🐍 Python visualization tools for openPMD files
Stars: ✭ 41 (-24.07%)
Mutual labels:  jupyter-notebook, research
Machine Learning From Scratch
Succinct Machine Learning algorithm implementations from scratch in Python, solving real-world problems (Notebooks and Book). Examples of Logistic Regression, Linear Regression, Decision Trees, K-means clustering, Sentiment Analysis, Recommender Systems, Neural Networks and Reinforcement Learning.
Stars: ✭ 42 (-22.22%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms
Dnc Tensorflow
A TensorFlow implementation of DeepMind's Differential Neural Computers (DNC)
Stars: ✭ 587 (+987.04%)
Mutual labels:  jupyter-notebook, research
Hyperparameter Optimization Of Machine Learning Algorithms
Implementation of hyperparameter optimization/tuning methods for machine learning & deep learning models (easy&clear)
Stars: ✭ 516 (+855.56%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms
Hackingtool
ALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+13827.78%)
Mutual labels:  hacking, hacker
Instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (+779.63%)
Mutual labels:  hacking, hacker
Spring2017 proffosterprovost
Introduction to Data Science
Stars: ✭ 18 (-66.67%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms
Play With Machine Learning Algorithms
Code of my MOOC Course <Play with Machine Learning Algorithms>. Updated contents and practices are also included. 我在慕课网上的课程《Python3 入门机器学习》示例代码。课程的更多更新内容及辅助练习也将逐步添加进这个代码仓。
Stars: ✭ 1,037 (+1820.37%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+685.19%)
Mutual labels:  hacking, hacker
Wahh extras
The Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (+692.59%)
Mutual labels:  hacking, hacker
Minerva Training Materials
Learn advanced data science on real-life, curated problems
Stars: ✭ 37 (-31.48%)
Mutual labels:  jupyter-notebook, machine-learning-algorithms

WhiteHat

Information about my Ethical Hacking experiences ...

This repository is divided by the next sections:

  • Python Scripts is the folder that has some code to hacks system by Python 2+ and Python 3+.
  • Courses, this folder has presentations, code, workshops about my courses, some of them are:
    • Cybersecurity club
    • Networks and lab
  • Research, this folder has some open source projects, articles, and presentations about my cybersecurity research.

Bibliography

  • Seitz, Justin. Black Hat Python: Python Programming for Hackers and Pentesters. No Starch Press, 2014.
  • Ramos, Antonio., Barberto, C. Marugan, D., & Gonzáles I. hacking con ingeniería social técnicas para hackear humanos
  • Hadnagy, C. (2014). Unmasking the social engineer: The human element of security. John Wiley & Sons.
  • Ramos, Antonio., Barberto, M. Rubén., G. Ángel., & Gonzáles I. Hacking y seguridad de páginas web
  • Lutz, M. (2013). Learning Python: Powerful Object-Oriented Programming. " O'Reilly Media, Inc.".
  • O'Connor, T. J. (2012). Violent Python: a cookbook for hackers, forensic analysts, penetration testers and security engineers. Newnes.
 ___   ___    __   ____  ___    ___    __    __    
|   | /  |   |  |  |  |  |  |  /  |   |  |  |  |       
|   |/  /    |  |  |  |  |  | /  /    |  |  |  |      
|      /     |  |  |  |  |      |      \  \_/  /  
|  |\  \     |  '--'  |  |  |\  \        \   /        
| _| `.__\   |________|  | _| `.__\      |___|
  
  
[0][1][0]                                                  .ed"""" """$$$$be.
[0][0][1]                                               -"           ^""**$$$e.
[1][1][1]                                             ."                   '$$$c
                                                     /                      "4$$b
                                                    d  3                      $$$$
                                                    $  *                   .$$$$$$
                                                   .$  ^c           $$$$$e$$$$$$$$.
                                                   d$L  4.         4$$$$$$$$$$$$$$b
                                                   $$$$b ^ceeeee.  4$$ECL.F*$$$$$$$
                                       e$""=.      $$$$P d$$$$F $ $$$$$$$$$- $$$$$$
                                      z$$b. ^c     3$$$F "$$$$b   $"$$$$$$$  $$$$*"      .=""$c
                                     4$$$$L        $$P"  "$$b   .$ $$$$$...e$$        .=  e$$$.
                                     ^*$$$$$c  %..   *c    ..    $$ 3$$$$$$$$$$eF     zP  d$$$$$
                                       "**$$$ec   "   %ce""    $$$  $$$$$$$$$$*    .r" =$$$$P""
                                             "*$b.  "c  *$e.    *** d$$$$$"L$$    .d"  e$$***"
                                               ^*$$c ^$c $$$      4J$$$$$% $$$ .e*".eeP"
                                                  "$$$$$$"'$=e....$*$$**$cz$$" "..d$*"
                                                    "*$$$  *=%4.$ L L$ P3$$$F $$$P"
                                                       "$   "%*ebJLzb$e$$$$$b $P"
                                                         %..      4$$$$$$$$$$ "
                                                          $$$e   z$$$$$$$$$$%
                                                           "*$c  "$$$$$$$P"
                                                            ."""*$$$$$$$$bc
                                                         .-"    .$***$$$"""*e.
                                                      .-"    .e$"     "*$c  ^*b.
                                               .=*""""    .e$*"          "*bc  "*$e..
                                             .$"        .z*"               ^*$e.   "*****e.
                                             $$ee$c   .d"                     "*$.        3.
                                             ^*$E")$..$"                         *   .ee==d%
                                                $.d$$$*                           *  J$$$e*
                                                 """""                              "$$$"
             


888                     888                     
888                     888                     
888                     888                     
88888b.  8888b.  .d8888b888  888 .d88b. 888d888 
888 "88b    "88bd88P"   888 .88Pd8P  Y8b888P"   
888  888.d888888888     888888K 88888888888     
888  888888  888Y88b.   888 "88bY8b.    888     
888  888"Y888888 "Y8888P888  888 "Y8888 888     
  
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].