bbauska / LFS170xLinks
Blockchain: Understanding Its Uses and Implications - Linux Foundation - LFS170x
☆13Updated 11 months ago
Alternatives and similar repositories for LFS170x
Users that are interested in LFS170x are comparing it to the libraries listed below
Sorting:
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated last year
- Master of Science in Cybersecurity, Sapienza University of Rome.☆53Updated 11 months ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- A C++, header-only DID:x509 resolver☆16Updated 3 months ago
- ⍺-MON anonymizes network traffic in real time. This software process network traffic on input interfaces to remove privacy sensitive info…☆13Updated 4 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Go wrapper for awslabs/certlint☆25Updated 5 years ago
- OpenSSF Project Template☆20Updated last year
- The official OWASP BLT App repository/ Heist 'em bugs!☆24Updated 2 weeks ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Global Security Database Project☆28Updated 2 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- This is a website template designed using CSS. It features glitch animations, and parallax background with mouse cursor trail.☆11Updated 5 years ago
- ☆17Updated 2 years ago
- Open YARA scan- and search engine☆24Updated 7 months ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- A tool to encode and decode content as whitespace☆18Updated 2 years ago
- List of Hardware Wallets for Digital Forensics☆27Updated 9 months ago
- open source society university☆29Updated 9 years ago
- Training scenarios for cyber ranges☆12Updated 5 years ago
- The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.☆94Updated last year
- Special purpose PowHSM firmware for the RSK PowPeg.☆16Updated this week
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆15Updated 5 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Updated last month
- CryptoLyzer is a fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers…☆43Updated 8 months ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last month
- Linux upstream vulnerabilities data suitable for dep-scan☆20Updated this week
- A web front-end for password cracking and analytics☆16Updated 6 years ago