Android version of the open source, encrypted, peer-to-peer, Beechat app.
☆12Oct 3, 2022Updated 3 years ago
Alternatives and similar repositories for BeechatNetwork-Android
Users that are interested in BeechatNetwork-Android are comparing it to the libraries listed below
Sorting:
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- Files for running statsd on Docker☆15Apr 8, 2014Updated 11 years ago
- Emacs Turtle and Notation 3 mode (forked from https://bitbucket.org/nxg/ttl-mode)☆11Sep 21, 2020Updated 5 years ago
- Get the metadata associated with an image. Also contains image utilities: filesize, scale, etc.☆18Jan 25, 2026Updated last month
- ☆11Mar 9, 2018Updated 7 years ago
- Kubernetes, Emacs, done!☆10Feb 13, 2026Updated 3 weeks ago
- Tissue - automated pep8 checker for nose☆16Nov 7, 2013Updated 12 years ago
- Learn about cryptography concepts - Both basics and core.☆10Aug 9, 2024Updated last year
- Tools for creating and manipulating immutable filesets☆13Dec 9, 2018Updated 7 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- ☆24Feb 28, 2021Updated 5 years ago
- Vör is a set of services for gathering metrics by polling systems and delivering them to graphite.☆48Mar 7, 2018Updated 8 years ago
- FPGA implementation of SKLearn Random Forest☆10Dec 12, 2016Updated 9 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- Treat undo history as a tree☆10May 25, 2024Updated last year
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Jul 1, 2021Updated 4 years ago
- Simple Blockchain implementation in Python. For fun and no profit.☆16Apr 8, 2018Updated 7 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Nov 22, 2023Updated 2 years ago
- Clojure content-addressable block store backed by Amazon S3.☆12Apr 24, 2020Updated 5 years ago
- Pedestal module for Arachne☆13Jun 30, 2017Updated 8 years ago
- wordcount example using electric and rama☆10Sep 7, 2023Updated 2 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Jul 19, 2021Updated 4 years ago
- TTL Writing Library☆14Feb 23, 2026Updated last week
- ☆14Jul 24, 2022Updated 3 years ago
- Building an Automated Perimeter Scanning System with Open Source Tools - NMAP, IVRE and Netbox☆14May 5, 2023Updated 2 years ago
- The resulting state or product of decomplecting: Clojure and ClojureScript libraries☆16Oct 30, 2015Updated 10 years ago
- A fast, extensible templating engine for Python 3 with Django-like syntax.☆20Dec 11, 2023Updated 2 years ago
- Using terraform, deploy multiple dataproc clusters using a shared hive metastore☆15Jun 24, 2022Updated 3 years ago
- Simple Python 3 web crawler☆13Jan 23, 2020Updated 6 years ago
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆18May 29, 2023Updated 2 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- eval-sexp-fu.el extensions for CIDER.☆15May 10, 2023Updated 2 years ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- Python 2/3 Interface for Google Voice API☆29Sep 15, 2017Updated 8 years ago
- Convex Design and Documentation☆16Feb 24, 2026Updated last week