Omegapoint / defence-in-depthView external linksLinks
Source code samples for "Defence in Depth" articles and presentations.
☆38Jan 29, 2026Updated 2 weeks ago
Alternatives and similar repositories for defence-in-depth
Users that are interested in defence-in-depth are comparing it to the libraries listed below
Sorting:
- Original workshops and staging area for new ones☆16Jul 3, 2025Updated 7 months ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Jan 11, 2026Updated last month
- ☆10Jan 14, 2015Updated 11 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- IC Cards for TANDY WP-2☆12Dec 29, 2025Updated last month
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆35Oct 23, 2025Updated 3 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- Exchange structured data between Arduino boards☆11Jul 5, 2019Updated 6 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- token exchange as a service☆11Feb 5, 2026Updated last week
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆18Jun 9, 2023Updated 2 years ago
- A software tool to control the voice boards of Roland JX-10/MKS-70/JX-8P with a serial adapter☆11Sep 26, 2023Updated 2 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Updated this week
- Dataset fingerprinting for AIBOM☆15Updated this week
- ☆14Jan 8, 2026Updated last month
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 10 months ago
- ☆11Feb 24, 2017Updated 8 years ago
- A GitHub Action that helps remove GHAS Licences☆12Jul 15, 2024Updated last year
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆18Sep 22, 2025Updated 4 months ago
- ⛔️ DEPRECATED Schibsted Account SDK for Android☆14Oct 27, 2021Updated 4 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆18Feb 6, 2023Updated 3 years ago
- ☆31Updated this week
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- Chat app for Android that supports answers from multiple LLMs at once. Bring your own API key AI client. Supports OpenAI, Anthropic, Goog…☆12Oct 30, 2024Updated last year
- Provides integration between Apache Wicket and Select2☆63Jun 7, 2021Updated 4 years ago
- ☆18Jul 30, 2024Updated last year
- ☆23Mar 20, 2025Updated 10 months ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- Manage your AWS SSM parameters☆16Jul 26, 2019Updated 6 years ago
- A monosynth based on the Hagiwo $9 VCO and the AS3372 Matrix 12 filter☆16Feb 27, 2024Updated last year
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆53Feb 5, 2026Updated last week
- I train a model using TensorFlow to detect the suit and number of a playing card. I created my own dataset by taking pictures of each car…☆14Aug 6, 2020Updated 5 years ago