☆16Apr 30, 2023Updated 2 years ago
Alternatives and similar repositories for DSRAM
Users that are interested in DSRAM are comparing it to the libraries listed below
Sorting:
- NIST SP 800-171 OSCAL Content☆16Nov 23, 2022Updated 3 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- Provisioning a highly-available Vault cluster on GCP GKE. In VaultCloud, many features are added on top of Vault core to make it fully fu…☆10Apr 20, 2022Updated 3 years ago
- ☆42Jul 23, 2025Updated 7 months ago
- ☆13Nov 18, 2025Updated 3 months ago
- Extending the default UE4 VR template with basic interactions like in Oculus/SteamVR Home. WIP.☆11Feb 14, 2021Updated 5 years ago
- Secure access cloud terraform provider☆13Feb 16, 2026Updated last week
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- Command-line utility for iteratively developing pipelines, deploying them at scale, and sharing data and derivatives☆10Jun 15, 2020Updated 5 years ago
- ☆11Feb 8, 2026Updated 3 weeks ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Python interpreter for SEL (Schweitzer Engineering Laboratories) CEV (Compressed EVent record) files.☆13Jan 16, 2023Updated 3 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- ☆11Jun 7, 2025Updated 8 months ago
- ☆10Jul 6, 2016Updated 9 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- ☆12Mar 14, 2022Updated 3 years ago
- Subreddit tools for Reddit moderators☆16Aug 5, 2013Updated 12 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 10 months ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Updated this week
- US Government controls formatted for usability☆16Jul 21, 2021Updated 4 years ago
- ☆10Jun 30, 2016Updated 9 years ago
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- GUI and command line application for downloading large data volumes from PI Historian☆11Nov 8, 2023Updated 2 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- Python scripts for setting up private LLM's on local and in the cloud with LangChain, GPT4All and Cerebrium☆11May 29, 2023Updated 2 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 4 years ago
- Summarize CTI reports with OpenAI☆18Feb 16, 2026Updated last week
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 4 years ago
- ☆14Dec 27, 2020Updated 5 years ago