☆17Feb 1, 2024Updated 2 years ago
Alternatives and similar repositories for sawtooth-sdk-python
Users that are interested in sawtooth-sdk-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Jan 28, 2022Updated 4 years ago
- Votem's Proof of Vote® protocol whitepaper☆23Oct 1, 2018Updated 7 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 8 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Nov 30, 2020Updated 5 years ago
- Bitagora code repository☆18Jan 27, 2025Updated last year
- This is an example of RSA encrypt/decrypt methods running on OP-TEE.☆11Sep 6, 2018Updated 7 years ago
- CoRIM and CoMID manipulation library☆22May 12, 2026Updated last week
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- ☆82Apr 12, 2022Updated 4 years ago
- Project to build and test seL4 for many different platforms☆17May 10, 2026Updated last week
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- django_microproject☆10Feb 12, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Multithreaded Python WSGI Implementation☆20Dec 29, 2013Updated 12 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Sawtooth PBFT consensus engine☆75Feb 1, 2024Updated 2 years ago
- ☆14Nov 23, 2023Updated 2 years ago
- This project is aimed to create a trustClient(use TrustZone on ARM) and a server program to verify whether a executable program on Raspbe…☆17Mar 15, 2024Updated 2 years ago
- For paper Container-IMA: https://www.usenix.org/system/files/raid2019-luo.pdf☆12Mar 12, 2020Updated 6 years ago
- On the TOCTOU Problem in Remote Attestation☆15Jun 4, 2024Updated last year
- 可信计算实验☆10Jan 3, 2022Updated 4 years ago
- AVENS is part of a research project that aims to provide a simulation test bed for virtual experiments of network coverage and connectivi…☆13Dec 20, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python templating engine - the one ton solution☆14Jan 29, 2026Updated 3 months ago
- A simple redis admin for django☆19Oct 9, 2020Updated 5 years ago
- Networking IDS , network traffic classification with ML. Final Project for ECE-417.☆14Jan 21, 2020Updated 6 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- ☆24Jun 22, 2024Updated last year
- An Intrusion Detection System for Contiki OS☆19Apr 18, 2020Updated 6 years ago
- The server part of the SafeKeeper project.☆17Jul 12, 2018Updated 7 years ago
- Reference template to start writing a Trusted Application☆13Jan 3, 2018Updated 8 years ago
- Example applications demonstrating the use of the WorkOS Python SDK to support SSO, Directory Sync, Admin Portal, and Magic Link.☆17Apr 29, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is an example of SSH Man in the Middle (MITM) attack using Mininet and Ettercap☆15Sep 24, 2015Updated 10 years ago
- Learn Ansible☆12Dec 6, 2020Updated 5 years ago
- Prebuilt OP-TEE 3.15 Binaries for QEMUv8 and Run x-test☆19Aug 21, 2022Updated 3 years ago
- Website for Research Artifacts from the Security Community☆32May 10, 2026Updated last week
- Supporting material for the Adobe Workshop as part of ArgoCon 2022☆18Oct 5, 2022Updated 3 years ago
- Simulations from Project GrADyS on OMNET++ and INET framework☆19Apr 15, 2025Updated last year
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Feb 21, 2024Updated 2 years ago