Repository for Privacy Research
☆11Feb 2, 2021Updated 5 years ago
Alternatives and similar repositories for PrivacyDocuments
Users that are interested in PrivacyDocuments are comparing it to the libraries listed below
Sorting:
- Privacy & Security Principles, Documents and Testing☆11Jul 28, 2020Updated 5 years ago
- A compilation of Trusted Pandemic Technologies' efforts to design digital solutions that engage citizens in four core areas — Logistics, …☆18Apr 12, 2021Updated 4 years ago
- Auto App Consent for Android Developers (GDPR/CCPA)☆29Mar 6, 2023Updated 2 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- This browser extension shows you whether consent registered by cookie banners of IAB Europe's Transparency & Consent Framework correspond…☆39Jun 23, 2023Updated 2 years ago
- pptx2txt is a tool that converts PowerPoint .pptx format to text.☆13Feb 19, 2026Updated last week
- Session Manager and Middleware for Go net/http☆11Feb 11, 2025Updated last year
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- My helix config files☆10Jul 30, 2023Updated 2 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- ☆14Mar 8, 2018Updated 7 years ago
- Faithful Python implementation of the paper "Towards Deep Symbolic Reinforcement Learning" by Garnelo et al.☆13Mar 23, 2021Updated 4 years ago
- App to quickly add Physical Machines into VMware Horizon Manual Pool☆11Mar 23, 2020Updated 5 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Dockerfile for distccd server on gentoo☆12Jul 19, 2014Updated 11 years ago
- ☆10Dec 23, 2021Updated 4 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Code to run Spaceman Sam's Tiki DrinkBot☆15Mar 14, 2021Updated 4 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- 🐧 A list of awesome applications, software, tools and other materials for Linux distros.☆11Oct 18, 2017Updated 8 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Kotlin docker images built upon official openjdk alpine images.☆11Sep 21, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- A tool for learning bug patterns.☆11Jul 19, 2016Updated 9 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- A vim docker setup that is a portable IDE☆14Nov 20, 2022Updated 3 years ago
- A map of who's doing what about Blockchain in Thailand☆13Oct 2, 2018Updated 7 years ago
- This repository contains examples to consume the API for electronic invoicing of the Ministerio de Hacienda of Costa Rica☆11Oct 26, 2017Updated 8 years ago
- ☆12May 9, 2017Updated 8 years ago
- A script to install Gentoo on a Raspberry Pi 2/3.☆10May 9, 2022Updated 3 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- Docker container for Zachary Rice Gitleaks☆20Aug 16, 2019Updated 6 years ago