bbauska / LFS170xLinks
Blockchain: Understanding Its Uses and Implications - Linux Foundation - LFS170x
☆12Updated last year
Alternatives and similar repositories for LFS170x
Users that are interested in LFS170x are comparing it to the libraries listed below
Sorting:
- Training scenarios for cyber ranges☆13Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆56Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆41Updated 2 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated last year
- This is a website template designed using CSS. It features glitch animations, and parallax background with mouse cursor trail.☆14Updated 5 years ago
- Repository for the Oulu University Security Engineering course.☆13Updated 3 months ago
- OpenSSF Project Template☆21Updated 2 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Go wrapper for awslabs/certlint☆25Updated 5 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Open YARA scan- and search engine☆25Updated 10 months ago
- List of sources for cybersecurity news☆40Updated 3 years ago
- Simplified NAT Slipstream server and client☆22Updated 5 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 7 months ago
- List of Hardware Wallets for Digital Forensics☆27Updated last year
- A port scanner written in PowerShell☆13Updated 4 years ago
- Maltego integration of https://abusix.com☆17Updated 7 years ago
- Personal blog about cyber security and challenges☆18Updated last year
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆15Updated 9 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 3 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- CA Issuers Monitor (Authority Info Access)☆13Updated 2 years ago
- A fast port scanner written in go with a focus on reliability and simplicity.☆20Updated last year
- ☆24Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.☆23Updated 7 months ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆41Updated last month
- Manage collection of SBOMs (Software Bill of Materials)☆14Updated last year