High-performance, real-time, multi-location data obfuscation tool
☆12Mar 6, 2020Updated 6 years ago
Alternatives and similar repositories for masquerade
Users that are interested in masquerade are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Realtime backup Redis data to S3☆11May 27, 2020Updated 5 years ago
- Parasitic Computing Framework☆15Oct 13, 2020Updated 5 years ago
- The scalable, auditable and high-performance tamper-evident log project☆102Feb 27, 2020Updated 6 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- A list of OpenStack Security Best Practices - written in Markdown☆10Apr 8, 2015Updated 10 years ago
- Perform searches against the RAE (Real Academia Española) dictionary.☆18Feb 8, 2023Updated 3 years ago
- A tool for anomaly detection over streaming data based on sentiment analysis☆30Jul 2, 2018Updated 7 years ago
- Using Facebook phrophet forecasting tool for Asteroid impact on earth time series study☆11Mar 11, 2018Updated 8 years ago
- A game to show how organize and mantains a gdg comunity☆12Jan 2, 2018Updated 8 years ago
- Time series based anomaly detector☆82May 6, 2021Updated 4 years ago
- ☆15Aug 17, 2017Updated 8 years ago
- Note: "Deep Reinforcement Learning: An Overview"☆12Mar 26, 2018Updated 7 years ago
- Workshop about DVC VSCode Extension☆13Sep 25, 2024Updated last year
- [WIP] How to set up a Kubernetes Federation without Cloud Provider☆11Sep 5, 2017Updated 8 years ago
- ☆15Sep 19, 2021Updated 4 years ago
- flippo helps you unwind☆10Sep 25, 2017Updated 8 years ago
- Global-Local Capsule Network (GLCapsNet) is a capsule-based architecture able to provide context-based eye fixation prediction for severa…☆36Dec 21, 2020Updated 5 years ago
- The clever vulnerability dependency finder☆96May 10, 2022Updated 3 years ago
- Python-like decorator in Rust☆15May 14, 2020Updated 5 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- ☆13Jul 16, 2023Updated 2 years ago
- A kindle app for ubuntu☆18Dec 22, 2024Updated last year
- Multi Tenant implementation for single database environments - Use grails-filtering and grails-hibernate-hijacker☆32Nov 12, 2021Updated 4 years ago
- This is the repo for the Nylas AI Hackaton☆15Oct 1, 2023Updated 2 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- Ethereum Chain metrics indexer (CL and EL): duties, rewards, balances, and many more☆31Updated this week
- Materials of the PyData Madrid monthly meetups☆16Oct 26, 2024Updated last year
- source for llmsec.net☆16Jul 24, 2024Updated last year
- ☆31Sep 1, 2023Updated 2 years ago
- 通过iOS RunTime时的一些特性,获取类的properties,ivars,instance methods, class methods☆12Apr 2, 2019Updated 6 years ago
- Código, documentos y recursos utilizados en el Stream iOS desde cero 📺 https://www.twitch.tv/dfreniche/☆38Sep 27, 2022Updated 3 years ago
- Operator for managing resource claims and provisioning☆11Updated this week
- Toy JVM is written in Rust☆13Jan 25, 2021Updated 5 years ago
- make vim snippets of AWS CloudFormation from official cfn's docs☆11Mar 18, 2019Updated 7 years ago
- A Starcraft 2 proxy reaper AI based on the CommandCenter bot. Inspired by the pro player ByuN, the king of Reaper Micro.☆11Sep 19, 2018Updated 7 years ago
- The world's leading data crawler platform!☆15Nov 22, 2018Updated 7 years ago
- ☆10Feb 7, 2021Updated 5 years ago
- bridge for Philips Hue to MQTT, written in Go☆11Jul 18, 2023Updated 2 years ago
- KsLiveSDK use phone's camera recording and push RTMP stream into server☆11Aug 25, 2015Updated 10 years ago