An internet based electronic voting system
☆13Dec 30, 2016Updated 9 years ago
Alternatives and similar repositories for E-voting-portal
Users that are interested in E-voting-portal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- COLLABORATE in building a collection of google COLAB notebooks☆76Apr 1, 2023Updated 2 years ago
- Pentest tools for Windows hacking processes☆13May 2, 2017Updated 8 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- A scriptable interface to ZeroTier One's administration API.☆20Jul 27, 2016Updated 9 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Mail Header Detective is a powerful tool that can help dissect complex email headers, providing useful insights and valuable information …☆14May 5, 2024Updated last year
- Personal scripts☆15Sep 11, 2024Updated last year
- Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark (http…☆13Jan 18, 2017Updated 9 years ago
- PowerShell para Administradores☆11Feb 18, 2020Updated 6 years ago
- ☆13Aug 11, 2020Updated 5 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- TrueMedia.org web application for querying multiple deepfake detection models and analyzing results☆22Jan 24, 2025Updated last year
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Small toolkit designed to enhance reconnaissance and logistical operations in OSCP labs☆14Feb 16, 2024Updated 2 years ago
- Java client to consume the ZeroTier API☆16Jan 26, 2026Updated 2 months ago
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆14Jul 4, 2025Updated 8 months ago
- Tools for Wazuh by Juan C. Tello☆15Jan 13, 2022Updated 4 years ago
- Apuntes de "Programación de servicios y procesos"☆12Nov 28, 2018Updated 7 years ago
- Dotfiles for BSPWM config☆13Apr 27, 2023Updated 2 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- CMSmap tool v0.6 - Simple CMS Scanner☆14Nov 15, 2017Updated 8 years ago
- ☆17Jan 17, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Deploy Google Hipster Shop microservices demo on Azure Kubernetes Service using Terraform and Skaffold, and monitor it with Prometheus an…☆16Aug 20, 2024Updated last year
- r2inspect is a professional malware analysis framework that automates deep static inspection for PE, ELF, and Mach-O binaries using the r…☆49Mar 23, 2026Updated last week
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Tracking and documenting monthly insights about hacktivist coalitions.☆23Sep 14, 2025Updated 6 months ago
- PoC presentada en CyberCamp 2018 para crear una shell mediante tramas 802.11☆23Nov 29, 2018Updated 7 years ago