Minhal128 / E-locks-A-blockchain-based-voting-systemLinks
E-locks: A blockchain-based voting system E-locks is a robust voting system implemented in C++ and OpenCV, leveraging blockchain technology for enhanced security and transparency. The system integrates facial recognition for user identification and encryption techniques to securely store voter data. Each vote is recorded in a blockchain ledger..…
☆14Updated last year
Alternatives and similar repositories for E-locks-A-blockchain-based-voting-system
Users that are interested in E-locks-A-blockchain-based-voting-system are comparing it to the libraries listed below
Sorting:
- ImagiMingle is a Python project that generates random images using Unsplash's API. It features a user-friendly interface to easily explor…☆16Updated last year
- Our Project consists of a Web-based graphical interface, in which you need to connect and log in to the required URL. Here our First acti…☆9Updated last year
- SPYSEE is an open-source keylogger malware designed to capture real-time images and screenshots of the user's screen. It can grab private…☆20Updated 9 months ago
- Malware Development for Ethical Hackers, published by Packt☆356Updated 8 months ago
- Pure Malware Development Resource Collections☆341Updated 7 months ago
- ⚠️ malware development☆584Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆367Updated this week
- Malware attacks/techniques explained☆178Updated last month
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,068Updated 2 months ago
- Config files for my GitHub profile.☆15Updated 3 weeks ago
- Deploy a Static Website using Amazon S3 and Route 53: Step-by-Step☆23Updated 2 months ago
- Next-Gen Stealer written in Go. Stealing from Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user on every …☆14Updated last week
- ZIP file password cracking using John-the-Ripper☆20Updated 2 months ago
- Java-project repo☆20Updated 2 months ago
- Deploy java web app into tomcat server☆21Updated 2 months ago
- Automating start / stop of EC2 instance using AWS lambda , Eventbridge☆23Updated 2 months ago
- Static-web hosting using AWS S3☆24Updated 2 months ago
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆28Updated 5 months ago
- LIPiKs is a modern React dashboard for data analytics and finance, built with Vite, React, Bun, and Tailwind CSS. Monitor your data analy…☆17Updated last month
- This is for Ethical Use only.☆418Updated 2 months ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆470Updated 7 months ago
- Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user…☆338Updated 8 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆250Updated this week
- xworm rce. allows you to run powershell on xworm c2s☆9Updated 2 months ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆16Updated 10 months ago
- Obfuscated Pegasus Spyware.☆27Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆410Updated last month
- Centralized resource for listing and organizing known injection techniques and POCs☆595Updated 3 weeks ago
- Collection of various malicious functionality to aid in malware development☆1,715Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆155Updated 2 years ago