-
05:13
(UTC +05:00) - https://awjunaid.com
- @awjunaid
- in/aw-junaid
- awjunaid_
- @awJunaid_
Highlights
-
aw-junaid Public
Protecting your data has never been more important. My cyber security blog is here to help you stay ahead of the game. I cover a wide range of topics, including phishing attacks, ransomware, data b…
-
cybersec-projects Public
Hands-on cybersecurity projects built for learning, experimentation, and practical security research — featuring offensive and defensive tools, automation scripts, and real-world simulations for et…
-
Hacking-Tools Public template
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
-
aw-junaid.github.io Public
Protecting your data has never been more important. My cyber security blog is here to help you stay ahead of the game. I cover a wide range of topics, including phishing attacks, ransomware, data b…
-
Algorithms Public
Learn and implement algorithms: sorting, searching, graph theory, and dynamic programming. Includes code examples, explanations, and performance analysis.
-
Kali-Linux Public
A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodologies, and best practices. Optimized for security profess…
-
Quantum-Mechanics Public
My personal research on quantum mechanics and quantum computing.
-
Computer-Science Public
Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emerging technologies.
-
Black-Hat-Python Public
A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.
-
awesome Public
Forked from sindresorhus/awesome😎 Awesome lists about all kinds of interesting topics
-
golang-web-security Public
Secure Golang web app with best practices: authentication, authorization, input validation, CSRF protection, and secure headers. Example code for secure development.
-
self-hostable-services Public
Explore free, self-hostable network services & web apps: email, file sharing, CMS, and more. Includes setup guides and Docker support for easy deployment.
-
PHP-Web-Security Public
Secure PHP web apps with best practices: SQLi prevention, XSS protection, CSRF tokens, password hashing, and secure session management.
-
Docker Public
Explore Docker examples: containerize apps, multi-container setups with Docker Compose, CI/CD integration, and best practices for efficient deployment.
-
programming-books Public
Curated collection of free programming books: Python, JavaScript, Go, Rust, and more. Learn coding, algorithms, and system design with open-source resources.
-
embedded-and-iot-security Public
Explore embedded & IoT security: secure firmware, device hardening, encryption, and vulnerability analysis. Practical examples for secure IoT development.
-
Malware-Analysis Public
Learn malware analysis techniques: reverse engineering, dynamic/static analysis, and sandboxing. Includes tools, scripts, and sample malware for hands-on practice.
-
Web-Security Public
Master web security: OWASP Top 10, XSS, SQLi, CSRF, and secure coding practices. Includes labs, tools, and examples for secure web development.
-
android-security Public
Explore Android security: secure app development, reverse engineering, vulnerability testing, and best practices for data protection and encryption.
-
DevOps-Security Public
Secure DevOps pipelines: CI/CD security, infrastructure as code (IaC) best practices, container security, and vulnerability scanning for robust deployments.
-
Fuzzing-for-Security-Testing Public
Learn fuzzing techniques for vulnerability discovery: AFL, libFuzzer, and custom fuzzers. Includes examples, tools, and tips for effective software testing.
-
Password-Cracking Public
Explore password cracking techniques: brute force, dictionary attacks, and rainbow tables. Includes tools, scripts, and ethical guidelines for security testing.
-
Explore ML for security: anomaly detection, malware classification, and threat prediction. Includes datasets, models, and tools for AI-driven cybersecurity solutions.
-
Security-and-Hacking Public
Explore ethical hacking and security: penetration testing, vulnerability scanning, and exploit development. Includes tools, scripts, and hands-on labs.
-
Python Public
Python projects for all levels: web scraping, data analysis, automation, and machine learning. Includes examples, libraries, and best practices.
-
eBPF-in-Security Public
Explore eBPF for security: real-time monitoring, intrusion detection, and kernel-level tracing. Includes examples, tools, and use cases for advanced threat analysis.
-
Cpp-or-C Public
Master C++ (or C) programming: data structures, algorithms, system design, and performance optimization. Includes examples and best practices for all levels.
-
Neuroscience Public
Explore neuroscience concepts: brain modeling, neural networks, and cognitive simulations. Includes datasets, tools, and research examples for computational neuroscience.
-
Assembly-Language Public
Forked from thewitcher21/Assembly-LanguageLearn Assembly Language basics: x86/x64 examples, low-level programming, performance optimization, and hardware interaction. Perfect for beginners and enthusiasts.
-
Data-Visualization Public
Master data visualization: interactive charts, dashboards, and storytelling with tools like Matplotlib, D3.js, and Tableau. Includes examples and datasets.