TransparencyToolkit / dataspec-siiLinks
Dataspec for SII
☆10Updated 8 years ago
Alternatives and similar repositories for dataspec-sii
Users that are interested in dataspec-sii are comparing it to the libraries listed below
Sorting:
- Your Access To Data☆73Updated 2 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆35Updated 9 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- Web crawling and document processing through a usable interface.☆72Updated 7 years ago
- Scripts needed to support Trackography project☆73Updated 9 years ago
- A Python implementation of our efficient Bloom filter library.☆29Updated 5 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Every document published from the Snowden archive☆68Updated 10 years ago
- Passive Bitcoin Project☆10Updated 9 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago
- Server & client software for Firewall Cafe☆3Updated last month
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆21Updated 8 months ago
- Intuitive and configurable search interface for document archives.☆201Updated 5 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Notes and reference for ongoing forecasting.☆16Updated 3 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 5 months ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- A user-first approach to threat modeling.☆17Updated last month
- attempts to map which submarine cables are tapped and where, based on Snowden documents.☆60Updated 10 years ago
- Data package with attacks against civil society☆13Updated 9 years ago
- Resume data and scripts for managing it☆91Updated 8 years ago
- reading lists☆31Updated 6 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- Threat Specification Language☆28Updated 9 years ago
- Top Level Domain data☆67Updated 5 years ago
- jq module to process Wikidata JSON format☆11Updated 6 years ago