miztiik / server-migration-onprem-to-awsView external linksLinks
Simple demonstration on how to Lift & Shift OnPremise workload to AWS ๐
โ34Apr 7, 2021Updated 4 years ago
Alternatives and similar repositories for server-migration-onprem-to-aws
Users that are interested in server-migration-onprem-to-aws are comparing it to the libraries listed below
Sorting:
- Online Binary Image Indexโ13Nov 14, 2016Updated 9 years ago
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.โ16Jul 18, 2025Updated 6 months ago
- Drivers for interfacing HackRF radios with REDHAWKโ11Jun 18, 2020Updated 5 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used tโฆโ12Nov 22, 2022Updated 3 years ago
- Mobile Tuts Plus UIStoryboardโ22Nov 30, 2011Updated 14 years ago
- โ10Oct 16, 2017Updated 8 years ago
- VW, Liblinear and StreamSVM compared on webspamโ14Oct 16, 2014Updated 11 years ago
- Golang bindings for the Binary Ninja Arm64 Disassembler.โ14Nov 24, 2025Updated 2 months ago
- โ11Oct 19, 2018Updated 7 years ago
- Extra cmdlets to help with quering security related information from Azureโ14Sep 16, 2024Updated last year
- โ11Sep 13, 2019Updated 6 years ago
- The code used to generate the Quandoom QASM fileโ14Nov 7, 2024Updated last year
- K-means Algorithm in Rubyโ10Mar 14, 2015Updated 10 years ago
- A softmax multi-armed bandit algorithmโ12Dec 30, 2018Updated 7 years ago
- Fetching data from systemโ12Jun 18, 2017Updated 8 years ago
- RuCTF 2022. Developed with โฅ by Hackerdom teamโ10May 22, 2022Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.โ16Feb 10, 2023Updated 3 years ago
- Reverse Shell troll softwareโ12Sep 24, 2019Updated 6 years ago
- โ12May 8, 2018Updated 7 years ago
- โ13Jun 26, 2021Updated 4 years ago
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functionsโ20Aug 15, 2025Updated 6 months ago
- Provide autocomplete feature for your testfields with external data sourceโ11Dec 11, 2015Updated 10 years ago
- Fake traceroute hop generatorโ13Apr 1, 2021Updated 4 years ago
- Example application for FlatBuffersโ14Oct 27, 2015Updated 10 years ago
- โ13May 9, 2017Updated 8 years ago
- Enhancements for git usability when using submodulesโ26Nov 11, 2015Updated 10 years ago
- Burp Suite Professional extension in Java for Tabnabbing attackโ13May 8, 2018Updated 7 years ago
- Guided tour and survey app using IBM Watson - Palm Beach Hackathon entry 2016โ13Nov 22, 2016Updated 9 years ago
- A curated list of Stellar services and tools for software developersโ23Apr 20, 2018Updated 7 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.โ21Nov 9, 2023Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegroundsโ20Nov 18, 2020Updated 5 years ago
- Purple Team Dropper generator using open source templates.โ17May 23, 2024Updated last year
- Our team's CTF writeupsโ12Jan 15, 2020Updated 6 years ago
- โ13Oct 15, 2018Updated 7 years ago
- Humorous image microservice for isolated networksโ19Jul 19, 2023Updated 2 years ago
- A collection of Cobalt Strike aggressor scriptsโ17Jul 7, 2020Updated 5 years ago
- Wordpress Plugins Listโ23Jun 17, 2019Updated 6 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Freeโ16Jun 8, 2020Updated 5 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by ofโฆโ26Mar 11, 2021Updated 4 years ago