Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      50 Projects in 50 Days - HTML/CSS and JavaScript

      Recommended Posts

      Staff

      50 Projects in 50 Days - HTML/CSS and JavaScript

      This is the main repository for all of the projects in the course.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WP-Hide Explained
          The convenient way to hide your WordPress from being visible through the code.
          A huge improvement over Site Security since hackers web scanners will not find any WordPress trace on your site. Over 99,99% of sites hacks are focused attacks on specific plugins and themes vulnerabilities. Since no WordPress plugins and themes are found anymore, no hack occur even if site using exploitable code.
          Provide a clean method for removing any WordPress fingerprints including themes and plugins.
          No negative impact on SEO at all ! Used wisely, specific SEO aspects can be improved.
          WP HIDE PRO now available!
          The plugin not only allow to change default urls of you WordPress, but it hide/block defaults! All other similar plugins just change the slugs, but the defaults are still accessible, obviously revealing the WordPress.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. About this book
          Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
          Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user’s identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.
          This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. GDBFrontend
          GDBFrontend is an easy, flexible and extension able gui debugger.
          Changelog v0.5.1 beta
          Added 32-bit and ARM Gotty executables.
          Added dark theme.
          Clear prev symbols while connecting gdbserver.
          Made it possible to stop execution while remote target running.
          Check if GDB is installed before run.
          Fix inner LinkedListVisualizer close event bubbles.
          Redirect /terminal to /terminal/.
          Send SIGKILL to process group.
          Various enhancements.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. GDBFrontend is an easy, flexible and extension able gui debugger.
          Changelog v0.5 beta
              Added dark theme.
              gdbfrontend-dark
              Clear prev symbols while connecting gdbserver.
              Made it possible to stop execution while remote target running.
              Check if GDB is installed before run.
              Fix inner LinkedListVisualizer close event bubbles.
              Redirect /terminal to /terminal/.
              Send SIGKILL to process group.
              Various enhancements.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. AmyMovie theme is a fully responsive WordPress theme designed for Movie websites. The various, modern and professional interface with clean code will make your Movie sites powerful, attractive and easy-to-use. You are easy to import movie data from IMDb and TMDb website. And with amazing showtime features, visitor can spend only some seconds to get the Movie Schedules in the different cinemas.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.