Use the Blockchain to generate a Blockchain-based authentication (BBA) that allows to store user's login information hash in a smart contract.
☆39Nov 8, 2024Updated last year
Alternatives and similar repositories for blockchain-based-authentication
Users that are interested in blockchain-based-authentication are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the files that provide the upload functionality in the IIS Server☆36Aug 4, 2021Updated 4 years ago
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Turn a standard Raspbian Lite install into a tor-ified wifi access point☆14Aug 3, 2017Updated 8 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- Public Code for ICS Evasion Attack Generation☆44Apr 23, 2021Updated 4 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Automatically exported from code.google.com/p/atv-bootloader☆23Mar 12, 2015Updated 11 years ago
- Python Scripts to Interact with VirusTotal, Malwares.com and Google Safe Browsing.☆11Dec 1, 2016Updated 9 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- Cloud Security Automation☆13Dec 2, 2020Updated 5 years ago
- Pentest tools for Windows hacking processes☆13May 2, 2017Updated 8 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- A scriptable interface to ZeroTier One's administration API.☆20Jul 27, 2016Updated 9 years ago
- Personal scripts☆15Sep 11, 2024Updated last year
- Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark (http…☆13Jan 18, 2017Updated 9 years ago
- stupidly simple wireguard provisioning for openwrt/libremesh☆25Mar 22, 2018Updated 8 years ago
- PowerShell para Administradores☆11Feb 18, 2020Updated 6 years ago
- ☆13Aug 11, 2020Updated 5 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- FluScan is an IPv4 Scanner for Internet designed by Flu Project Team. FluScan has been developed in Python.☆14Mar 6, 2018Updated 8 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Java client to consume the ZeroTier API☆16Jan 26, 2026Updated last month
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆14Jul 4, 2025Updated 8 months ago
- Tools for Wazuh by Juan C. Tello☆15Jan 13, 2022Updated 4 years ago
- Repositorio del TFG de Vidal Pérez☆14Oct 28, 2023Updated 2 years ago
- Dotfiles for BSPWM config☆13Apr 27, 2023Updated 2 years ago
- Curso de infraestructura cloud con Openstack. Universidad de Almeria. Mayo 2017☆15Feb 14, 2021Updated 5 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- Vuln Liferay scanner & Exploit☆21Mar 30, 2020Updated 5 years ago
- CMSmap tool v0.6 - Simple CMS Scanner☆14Nov 15, 2017Updated 8 years ago
- ☆10May 16, 2025Updated 10 months ago
- Diseño y construcción de un planificador de procesos a corto plazo☆12Nov 9, 2019Updated 6 years ago
- Deploy Google Hipster Shop microservices demo on Azure Kubernetes Service using Terraform and Skaffold, and monitor it with Prometheus an…☆16Aug 20, 2024Updated last year