bbauska / LFS170xLinks
Blockchain: Understanding Its Uses and Implications - Linux Foundation - LFS170x
☆13Updated 9 months ago
Alternatives and similar repositories for LFS170x
Users that are interested in LFS170x are comparing it to the libraries listed below
Sorting:
- Master of Science in Cybersecurity, Sapienza University of Rome.☆51Updated 9 months ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Artificial general intelligence (AGI), or general AI, is a theoretical form of AI where a machine would have an intelligence equaled to h…☆11Updated 4 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- Use onion scan to detect the dark net web service, This Repo Contained Recently Scan Results☆10Updated 6 years ago
- A tool to encode and decode content as whitespace☆18Updated last year
- Some ELF Malwares☆10Updated 3 years ago
- PHP code to determine which reality (Server OS and web app versions) the app is running in (yeah... it's a play on Rick and Morty)☆12Updated 8 months ago
- ⍺-MON anonymizes network traffic in real time. This software process network traffic on input interfaces to remove privacy sensitive info…☆12Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- The official OWASP BLT App repository/ Heist 'em bugs!☆24Updated 5 months ago
- A C++, header-only DID:x509 resolver☆16Updated 2 months ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆14Updated 4 months ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆21Updated last week
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Cryptanalysis and attack library☆23Updated 3 years ago
- OpenSSF Project Template☆20Updated last year
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated last year
- List of Hardware Wallets for Digital Forensics☆27Updated 7 months ago
- OpenCTI Documentation Space☆22Updated this week
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆20Updated 5 years ago
- Root Program parsers and SQL import script generators☆24Updated last month
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆38Updated 5 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago