bbauska / LFS170xLinks
Blockchain: Understanding Its Uses and Implications - Linux Foundation - LFS170x
☆13Updated 10 months ago
Alternatives and similar repositories for LFS170x
Users that are interested in LFS170x are comparing it to the libraries listed below
Sorting:
- Artificial general intelligence (AGI), or general AI, is a theoretical form of AI where a machine would have an intelligence equaled to h…☆11Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆52Updated 9 months ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- OSINT Platform - Provides image analysis, digital footprints, video transcription and more. Retrieval Augmented Generation (RAG) capable …☆11Updated last year
- This is a website template designed using CSS. It features glitch animations, and parallax background with mouse cursor trail.☆11Updated 5 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Security scanner using YARA☆17Updated last week
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆33Updated 8 months ago
- Use onion scan to detect the dark net web service, This Repo Contained Recently Scan Results☆10Updated 6 years ago
- ☆19Updated 3 years ago
- List of Hardware Wallets for Digital Forensics☆27Updated 8 months ago
- Some ELF Malwares☆10Updated 3 years ago
- A guide to osint research, including osint information and tools about japan. approaches to non-japanese speaking countries.☆34Updated 2 months ago
- Linux upstream vulnerabilities data suitable for dep-scan☆20Updated last week
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- ☆24Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- The SAF Training Lab is a GitHub Codespaces environment that makes it quick and easy for you to use, learn and participate in the MITRE S…☆14Updated 6 months ago
- Kiddy - (linux) kernel identity spoofer☆15Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- Custom Binary Ninja Themes☆12Updated last year
- ☆16Updated 2 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆30Updated 6 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- An SSH honeypot written entirely in Go.☆12Updated 7 months ago
- List of sources for cybersecurity news☆37Updated 2 years ago
- Training scenarios for cyber ranges☆12Updated 5 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year