Skip to content
View ClaudiasLibrary's full-sized avatar

Block or report ClaudiasLibrary

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ClaudiasLibrary/README.md

💫Hi!

My name is Claudia and I’m a Computer Science student specializing in Cybersecurity.

This is an extension of Claudia's Library on Notion

Collaborations are very welcome!⭐️

Currently using:

My Skills

ClaudiasLibrary

ClaudiasLibrary

Pinned Loading

  1. mitm-proxy mitm-proxy Public

    This project is a Man-in-the-Middle (MITM) Proxy tool built using mitmproxy. It allows for real-time HTTP/HTTPS traffic interception, modification, and analysis.

    Python

  2. network_vuln_scanner network_vuln_scanner Public

    Network Vulnerability Scanner. This tool will scan a network or a set of IP addresses to identify open ports, potential vulnerabilities, and possible attack surfaces.

    Python

  3. MyPass MyPass Public

    A simple password manager and secure password generator built with Python and Tkinter.

    Python

  4. password_cracking password_cracking Public

    This tool automates the process of analyzing password hashes, identifying the hashing algorithms, and cracking the hashes using either dictionary or brute-force attacks. It supports common hash alg…

    Python

  5. webAppSec webAppSec Public

    This tool automates the process of auditing a web application for common security vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), and missing HTTP security headers. The results o…

    Python

  6. hacking-101 hacking-101 Public

    A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.

    2