cromulencellc / hackasat-qualifier-2023-techpapersView external linksLinks
hackasat-qualifier-2023-techpapers
☆11Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for hackasat-qualifier-2023-techpapers
Users that are interested in hackasat-qualifier-2023-techpapers are comparing it to the libraries listed below
Sorting:
- hackasat-qualifier-2023☆28May 16, 2023Updated 2 years ago
- Hack-a-Sat 4 2023 - Finals Public Release☆58Nov 6, 2023Updated 2 years ago
- ☆31Dec 29, 2022Updated 3 years ago
- A simple simulator for modeling earth-to-space RFI attacks. Demonstrated at DEFCON 30.☆41Jul 19, 2023Updated 2 years ago
- This contains 100 days of the notes which i have learned with the internship.☆16Dec 1, 2024Updated last year
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆11Apr 24, 2025Updated 9 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 8 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- ☆11Oct 13, 2025Updated 4 months ago
- Satcom radio website☆14Jan 29, 2026Updated 2 weeks ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- A low-cost remote vital signs monitor for home patients☆12Sep 21, 2020Updated 5 years ago
- Simplify and speed up common tasks in your ORT-based FOSS review workflows☆13Dec 19, 2025Updated last month
- A GPT-based chatbot who knows the content of your Confluence wiki.☆14Apr 22, 2025Updated 9 months ago
- ☆10Mar 6, 2023Updated 2 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- Converts JSON data to HTML table with collapsible details view for nested objects.☆14May 1, 2021Updated 4 years ago
- Adaptive Machine Learning-Based Stock Prediction using Financial Time Series Technical Indicators☆10Dec 21, 2019Updated 6 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- List of all Memcached Servers that are vulnerable to DDoS attack vector☆10Dec 21, 2020Updated 5 years ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆13Mar 20, 2023Updated 2 years ago
- Simple Docker definition to serve mocked APIs from static JSON files.☆11Apr 27, 2018Updated 7 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Updated this week
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Repair docker-smell automatically☆13May 15, 2024Updated last year
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago
- A cookiecutter template for creating MCP (Model Control Protocol) servers☆20Jan 6, 2026Updated last month
- Create CycloneDX Software Bill of Materials (SBOM) for Buildroot projects☆14Dec 9, 2025Updated 2 months ago
- ☆15Feb 21, 2023Updated 2 years ago
- Arch Linux dotfiles☆10Oct 31, 2024Updated last year
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- ☆12Aug 21, 2020Updated 5 years ago
- Docker configuration for running Pi-Hole and Cloudflared on a Raspberry Pi for ultimate network DNS filtering and security☆11Jul 17, 2021Updated 4 years ago
- Repository for the defense mechanism of the paper "The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"☆10Feb 10, 2022Updated 4 years ago
- ☆29Oct 29, 2025Updated 3 months ago