AiC-Project / aic-project.github.ioLinks
This is the description website for the AiC 2.0 Project.
☆14Updated 8 years ago
Alternatives and similar repositories for aic-project.github.io
Users that are interested in aic-project.github.io are comparing it to the libraries listed below
Sorting:
- This server serves the files at airborn.io, manages users, and keeps track of users file sizes.☆60Updated last year
- A guided tour of docker basics☆24Updated 8 years ago
- ☆29Updated last week
- A Next Generation Honeypot for a 2016 Oregon State Senior Project☆67Updated 9 years ago
- HTTPS Server without a public/static IP. TLS Tunnels with decentralized credentials.☆87Updated 5 years ago
- Using serverless functions to provide an API for checking potential passwords against an enormous corpus of passwords leaked from securit…☆114Updated 8 years ago
- This is Airborn itself, which includes reading/writing files (modules/core), an app runtime (modules/webapi) and the tabbed interface (mo…☆144Updated 4 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆166Updated 8 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 9 years ago
- Salt recipe to automatically secure sshd (and piss off the NSA)☆16Updated 9 years ago
- A public database for software and firmware hashes☆215Updated 9 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆66Updated 7 years ago
- A Linux shell script to improve your privacy online☆86Updated 10 years ago
- Flexible Rule-Based Proxy☆179Updated 5 months ago
- Fake-server is a generic and non-intrusive tool used to mock any server response. It has been designed to address issues when running tes…☆55Updated 7 years ago
- Programmable Dropbox for secure IoT☆70Updated 8 years ago
- Secure multi-party cloud backup solution based on Shamir's Secret Sharing scheme.☆29Updated 9 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆64Updated 3 years ago
- ☆56Updated 8 years ago
- given an ip address, return which cloud provider it belongs to (AWS, GCE, etc)☆143Updated 8 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆123Updated 9 years ago
- The Swiss army knife of data examination and manipulation☆333Updated 7 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- A platform to study browser fingerprinting☆73Updated 3 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆63Updated 9 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- MCVirt - Command line virtual machine management utility☆24Updated 5 years ago
- An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers☆59Updated 7 years ago
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago