sigstore / rekor-tilesView external linksLinks
Signature Transparency Log designed for ease of use, low cost, and minimal maintenance
☆30Feb 9, 2026Updated last week
Alternatives and similar repositories for rekor-tiles
Users that are interested in rekor-tiles are comparing it to the libraries listed below
Sorting:
- ☆11Dec 19, 2024Updated last year
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated last year
- Log monitor for Rekor to verify immutability and monitor entries☆45Updated this week
- ☆30Feb 2, 2026Updated last week
- ☆16Oct 24, 2021Updated 4 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Search Rekor for entries☆39Feb 7, 2026Updated last week
- A generalized ESPRIT algorithm for MATLAB☆15Jan 28, 2021Updated 5 years ago
- Public Key Infrastructure without Certificate Authorities, for WordPress and Packagist☆37Jan 17, 2022Updated 4 years ago
- a hackbot proof-of-concept☆41Feb 24, 2024Updated last year
- RCE PoC for Tensorflow using a malicious Lambda layer☆61Jul 30, 2025Updated 6 months ago
- A Google Chrome extension to open/edit latex files online using www.overleaf.com without the need of any software to be installed.☆10Dec 16, 2016Updated 9 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- A Mathematica Package for Cooperative Game Theory☆11Jun 6, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- 下载豆瓣电子书☆10Apr 25, 2017Updated 8 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Campanella - Open-source bell management system☆11Feb 18, 2018Updated 7 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- A program to automatically infer differential privacy properties of your julia source code.☆12May 12, 2022Updated 3 years ago
- Praat scripting入门☆15Apr 8, 2025Updated 10 months ago
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated last month
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- Get a council of LLMs to advise consult for you! A plugin for the llm cli utility☆16Feb 1, 2025Updated last year
- ☆11Dec 26, 2023Updated 2 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- neovim plugin for ghcid☆15Dec 8, 2025Updated 2 months ago
- toy project to learn about the memory usage of different workloads with different allocators☆10Mar 30, 2023Updated 2 years ago
- A library to facilitate the static analysis of Android apps☆15Jul 22, 2025Updated 6 months ago
- A bunch of extra functionality for Hakyll-based sites.☆11Sep 30, 2015Updated 10 years ago
- Reliable AI Manifesto☆28Nov 3, 2025Updated 3 months ago
- ☆14Sep 1, 2024Updated last year
- Exploiting CVE-2014-3153, AKA Towelroot.☆13Jan 16, 2021Updated 5 years ago
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated last month
- QEMU support for a custom board based on a Microchip ATSAMD21G18A microcontroller (MCU)☆14Jun 10, 2024Updated last year
- Fourmolu GitHub Action☆13Oct 25, 2024Updated last year
- Delay Differential Equations in Haskell☆11Dec 4, 2018Updated 7 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago