ImplyingProgramming / kamina-backendLinks
A Kamina backend using python and IPFS
☆9Updated 7 years ago
Alternatives and similar repositories for kamina-backend
Users that are interested in kamina-backend are comparing it to the libraries listed below
Sorting:
- IPFS-based decentralized social networking platform☆15Updated 7 years ago
- cicada-2014☆49Updated 2 years ago
- Twitter as an extra entropy source☆103Updated 7 years ago
- .ipk package that turns your mint OpenWRT into a PirateBox☆31Updated 12 years ago
- Extracting information from phone numbers☆5Updated 8 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆19Updated 8 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- The Hacker's Sandbox☆123Updated 2 months ago
- Demonsaw Source Code☆124Updated 3 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- ☆32Updated 5 years ago
- Simple IRC (Internet Relay Chat) Client written in Python☆59Updated 6 years ago
- Random Code, POC Scripts and other things (Your Mileage May Vary)☆89Updated 6 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 6 years ago
- [needs some love] Gentoo Portage overlay for LBRY☆9Updated 6 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆542Updated 7 years ago
- A collection of some different gnuradio-companion projects☆36Updated 8 years ago
- A simple program to generate images from a file. Inspired by pearl-clutching and grandstanding in response to the Liberator.☆43Updated 6 years ago
- ☆82Updated 8 years ago
- Passive SDR analysis of goTenna packets with scapy☆37Updated 3 years ago
- RF retroreflectors☆101Updated 9 years ago
- OpenBSD signify for Windows systems☆7Updated 9 years ago
- ☆44Updated 2 weeks ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Secure/anonymous IRC-like chat using TOR hidden services☆40Updated 11 years ago
- A simple powershell script that removes a lot of Windows 10's more unnecessary, annoying, or invasive components.☆23Updated 9 years ago
- a pocket-sized, teensy-based HID emulator used to exploit the targeted computer's trust of USB keyboards and mice.☆9Updated 9 years ago
- A collection of boobie traps designed to detect malicious mischief and respond appropriately.☆15Updated 7 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago