Leitfaden Software-Architektur
☆14Sep 7, 2019Updated 6 years ago
Alternatives and similar repositories for software-architektur
Users that are interested in software-architektur are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- How to setup Pycharm to run scripts in IDA using the Run menu (or a keybind)☆42Jun 3, 2024Updated last year
- [OUTGUESS] : Outguess is an advanced free steganography tool for mac...☆18Feb 22, 2024Updated 2 years ago
- Betriebssysteme Vorlesung an der ZHAW☆14Mar 24, 2026Updated 3 weeks ago
- Python module for latest CyberSpace updates.☆16May 26, 2023Updated 2 years ago
- Display caldav events and Home assistant sensor data on en e-ink display☆13Oct 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IDA Python deobfuscation script for ConfuserEx binaries☆35Sep 15, 2022Updated 3 years ago
- Rocky Linux Guide☆32Jul 8, 2021Updated 4 years ago
- ☆27Apr 1, 2017Updated 9 years ago
- Dokumente zu meinem Informatik-Studium an der Hochschule Luzern ‒ Informatik (2016-2020)☆22Aug 24, 2024Updated last year
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆99Jan 13, 2026Updated 3 months ago
- ☆33Jul 14, 2023Updated 2 years ago
- Pattern-first, framework-agnostic, a11y focused, adaptive design system☆28Oct 25, 2025Updated 5 months ago
- List of iCloud Private Relay egress IP addresses in various formats for easy integration into your network infrastructure☆65Updated this week
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CNCF Certified Kubernetes Application Developer (CKAD)☆67Jan 23, 2019Updated 7 years ago
- Enhance database locking & unlocking - Quick Unlock and more☆49Feb 22, 2026Updated last month
- FinSpy for Android technical analysis and tools☆65Oct 25, 2020Updated 5 years ago
- ☆63Aug 1, 2023Updated 2 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆55Oct 29, 2022Updated 3 years ago
- Random Cyber Threat Intelligence☆55Feb 17, 2026Updated 2 months ago
- For those times when your Pwnagotchi feels lonely☆75Jan 28, 2026Updated 2 months ago
- ATT&CK Evaluations Library☆96Jan 22, 2026Updated 2 months ago
- A collection of exercises, solutions, projects, summaries and more by students @ HSLU☆62Nov 13, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Cast your OSINT net further a field and see what else you can discover on the Internet.☆94Nov 29, 2025Updated 4 months ago
- Tryhackme rooms & tools☆63May 22, 2020Updated 5 years ago
- Sample programs to access the API☆107Dec 8, 2025Updated 4 months ago
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆256Mar 23, 2026Updated 3 weeks ago
- An automatic unpacker and logger for DotNet Framework targeting files☆266Aug 23, 2023Updated 2 years ago
- Indicators of Compromise (IOCs) from malware or suspicious network traffic☆138Feb 3, 2026Updated 2 months ago
- ☆93Jun 17, 2024Updated last year
- Proof-of-concept code for various bugs☆111Oct 30, 2024Updated last year
- Malware Sandboxes & Malware Source☆109May 3, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A curated list of security card games.☆164Jun 2, 2025Updated 10 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆157Feb 17, 2024Updated 2 years ago
- ON NO! Someone put an RPG in a packet sniffer☆504Feb 22, 2026Updated last month
- PowerShell Scripts focused on Post-Exploitation Capabilities☆321Dec 29, 2017Updated 8 years ago
- IPython console integration for IDA Pro☆837Feb 19, 2026Updated 2 months ago
- If you're new to DDD and not sure where to start, this process will guide you step-by-step☆5,768Dec 28, 2025Updated 3 months ago
- IDA FLIRT Signature Database☆900Jun 27, 2022Updated 3 years ago