File System Integrity checker (etc)
☆34Nov 14, 2017Updated 8 years ago
Alternatives and similar repositories for OS_Project
Users that are interested in OS_Project are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- this simple tool help you to detect Deauth_DoS Attack on your Machine☆25Jun 1, 2019Updated 6 years ago
- Caesar cipher encryption and decryption☆20May 22, 2023Updated 2 years ago
- ☆40Oct 16, 2018Updated 7 years ago
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆19Apr 5, 2013Updated 13 years ago
- This project was developed using Packet Tracer version 8.2.1, showcasing a comprehensive network setup.☆15Jan 8, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This repository is made for WSN project in 2018. This repository contains all programs which are used on AQMS (Air Quality Monitoring Sys…☆13Sep 4, 2021Updated 4 years ago
- Making the classroom smart using deep learning and Internet of Things☆10Jan 22, 2021Updated 5 years ago
- This system will try to provide a solution to the problem of wasting time waiting for our foods in canteen by providing an order placing…☆10Mar 29, 2026Updated last week
- This demo is a cutting-edge web application that enables seamless interaction with Google's Gemini 2.0 AI model through audio, video, and…☆14Mar 3, 2025Updated last year
- File Type Identification Tool & Metadata extractor intended for automation☆30May 26, 2025Updated 10 months ago
- File type identification using libmagic☆54Dec 11, 2019Updated 6 years ago
- ☆43Sep 18, 2025Updated 6 months ago
- Simulation of a routing protocol for Wireless Sensor Networks(WSN).☆25Feb 2, 2024Updated 2 years ago
- Decentralized medical record storage web app☆10Mar 20, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Wireless Sensor Network for Research☆29Jul 24, 2020Updated 5 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Decentralized Application for Agriculture Supply Chain Management☆19Mar 7, 2018Updated 8 years ago
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆35Dec 28, 2025Updated 3 months ago
- The project's main aim is to develop a web-based application that will make it possible for the former students of the College to keep in…☆13Mar 15, 2023Updated 3 years ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆67Nov 14, 2025Updated 4 months ago
- CloudCustodian Rules engine for cloud security and governance, DSL in yaml for policies to query, filter, and take actions on resources☆22Aug 25, 2023Updated 2 years ago
- ☆16Mar 22, 2023Updated 3 years ago
- Ever® Gauzy™ Desktop Timer App - https://gauzy.co/downloads☆23Mar 15, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Simple node.js linux only keylogger using events☆59Apr 5, 2019Updated 7 years ago
- The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a …☆23Aug 23, 2023Updated 2 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- A disk space renting system using blockchain technology is a platform that allows users to rent out or lease unused storage space on thei…☆16Jun 23, 2024Updated last year
- An image encryption node-js cli☆73Dec 16, 2021Updated 4 years ago
- ☆32Nov 29, 2020Updated 5 years ago
- Ransomware Simulator for testing Blue Team Detections☆36Jun 5, 2022Updated 3 years ago
- Our solution is a computer vision system that translates facial behavior statistics into an engagement metrics as a feedback to inform a …☆23Sep 11, 2024Updated last year
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆27Jun 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- ☆11Mar 12, 2023Updated 3 years ago
- ☆30Nov 8, 2017Updated 8 years ago
- ☆61Nov 4, 2025Updated 5 months ago
- Official documentation for the MANTRA DAO platform☆11Oct 17, 2022Updated 3 years ago
- Panvala helps communities earn funding by collecting Panvala Stamps. Join our movement to increase every community’s budget across our so…☆13Mar 5, 2023Updated 3 years ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 3 months ago