Signature Transparency Log designed for ease of use, low cost, and minimal maintenance
☆32Mar 2, 2026Updated last week
Alternatives and similar repositories for rekor-tiles
Users that are interested in rekor-tiles are comparing it to the libraries listed below
Sorting:
- ☆11Dec 19, 2024Updated last year
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated last year
- Log monitor for Rekor to verify immutability and monitor entries☆48Mar 2, 2026Updated last week
- ☆31Mar 2, 2026Updated last week
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last month
- generic CMP [RFC 9810, RFC 9483] client library and CLI, based on OpenSSL☆14Feb 17, 2026Updated 2 weeks ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆11Sep 23, 2025Updated 5 months ago
- A generalized ESPRIT algorithm for MATLAB☆15Jan 28, 2021Updated 5 years ago
- Search Rekor for entries☆39Updated this week
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- Repository for Stellaris Immortal alpha☆17May 9, 2020Updated 5 years ago
- ☆12Oct 13, 2022Updated 3 years ago
- 下载豆瓣电子书☆10Apr 25, 2017Updated 8 years ago
- A Mathematica Package for Cooperative Game Theory☆11Jun 6, 2024Updated last year
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- A Discord bot that replaces twitter URLs with vxtwitter for videos and GIFs.☆13Feb 25, 2023Updated 3 years ago
- ☆16Oct 24, 2021Updated 4 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- ☆10May 12, 2022Updated 3 years ago
- A Google Chrome extension to open/edit latex files online using www.overleaf.com without the need of any software to be installed.☆10Dec 16, 2016Updated 9 years ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Oct 30, 2023Updated 2 years ago
- Campanella - Open-source bell management system☆11Feb 18, 2018Updated 8 years ago
- Basic Unicode support for Lean 4☆15Updated this week
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Nix build hook that forwards builds to job schedulers.☆29Mar 2, 2026Updated last week
- Handshake integration with Coinbase Rosetta☆13Mar 26, 2022Updated 3 years ago
- Additional features supporting paclets in Mathematica☆15Oct 3, 2017Updated 8 years ago
- ☆11Feb 15, 2022Updated 4 years ago
- GitHub Profile Frontpage☆12May 30, 2024Updated last year
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated last month
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- A program to automatically infer differential privacy properties of your julia source code.☆12May 12, 2022Updated 3 years ago
- Adds color to your Wolfram Language outputs in an ANSI capable terminal☆10Sep 19, 2019Updated 6 years ago
- 🚀 High-performance mutation testing tool for Go☆21Feb 24, 2026Updated 2 weeks ago