FAB619 / Protection-Mask--COVID-19Links
3D printed Protection mask. for tunisian doctors and medical srtaff. A prototype face shield that we developed. In three days, we went through dozens of prototypes and many verifications with doctors and experts.
☆35Updated 5 years ago
Alternatives and similar repositories for Protection-Mask--COVID-19
Users that are interested in Protection-Mask--COVID-19 are comparing it to the libraries listed below
Sorting:
- Slide decks from my conference presentations☆34Updated 6 years ago
- Easily send out many customised emails to your contacts.☆18Updated 6 years ago
- W3C Standards Vulnerability Disclosure & Handling Process and Policy☆25Updated 2 months ago
- talking LED mask for BSides 2020 presenters☆22Updated 5 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 5 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- A medium interaction printer honeypot 🍯☆203Updated 2 years ago
- Pixel Safe Encryption - Now Cryptographically Secure☆57Updated 2 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Updated 4 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆112Updated last year
- A Passive DNS backend and collector☆33Updated 3 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 7 years ago
- Code for the SecureDrop project website☆42Updated this week
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 7 years ago
- ☆39Updated 9 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Updated 5 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- ☆166Updated 6 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆154Updated 5 years ago
- ☆21Updated 9 years ago
- A tool to spider Github or search URLs for various information leaks☆34Updated 2 years ago
- Searches for pronbots by looking at followers/following☆92Updated 7 years ago
- Cloudshell proof of concept for LiveOverflow☆15Updated 6 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 3 months ago
- All related files and slides for past talks☆44Updated 3 weeks ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Web on top of any protocol☆113Updated 5 years ago
- Protect your parents from phishing☆40Updated 8 years ago
- Code to extract messages from WhatsApp sqlite DB (written in Python as Jupyter notebook)☆75Updated 7 months ago