A real-time web application for patient monitoring using ReactJS, NodeJS, ExpressJS, MongoDB, and Raspberry Pi.
☆22May 3, 2023Updated 2 years ago
Alternatives and similar repositories for smart-health-monitoring-system
Users that are interested in smart-health-monitoring-system are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Making Airtags beep using an ESP32-C3☆13Aug 17, 2023Updated 2 years ago
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated last month
- Open-source, enterprise-grade threat modeling platform☆47Updated this week
- ☆11Oct 13, 2025Updated 5 months ago
- Web accessible Kicad inside an Alpine Container☆25Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- Hyperterm theme based on gruvbox☆17Feb 10, 2017Updated 9 years ago
- ☆14Dec 22, 2015Updated 10 years ago
- Embeded Toolchains in opensource way☆17Mar 22, 2023Updated 3 years ago
- Notes I make for anything related to security.☆13Nov 3, 2022Updated 3 years ago
- hackasat-qualifier-2023-techpapers☆11Jul 17, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jun 12, 2022Updated 3 years ago
- Tools to make life easier ^_^☆13Aug 21, 2025Updated 7 months ago
- The RedStack DB extracted as an Obsidian Vault☆42Dec 25, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This contains 100 days of the notes which i have learned with the internship.☆18Dec 1, 2024Updated last year
- A tool collection of various attacks on TLS based on TLS-Attacker☆23Jun 25, 2025Updated 9 months ago
- A Minimalist Asynchronous Toolkit (AMAST) is a small and efficient C99 library that helps manage complex, event-driven programs. It combi…☆25Updated this week
- A demo docker image for common privilege escalation techniques in *nix systems☆10Oct 5, 2025Updated 6 months ago
- A curated list of my GitHub stars☆21Updated this week
- A curated list of my GitHub stars!☆23Updated this week
- Virtual Greenscreen For Video Broadcast☆16Oct 19, 2021Updated 4 years ago
- Quantitative risk simulation tools☆20Aug 18, 2022Updated 3 years ago
- aNOther CTF platform☆30Jan 23, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.☆24Jun 10, 2023Updated 2 years ago
- AWS CloudFormation templates and Python code for AWS blog post on how to automate IAM credential reports at scale across AWS.☆18Sep 19, 2022Updated 3 years ago
- This repository collects lecture notes on Cryptography that are publicly accessible.☆28Jan 25, 2022Updated 4 years ago
- OWASP Foundation web repository☆57Updated this week
- Publications from the eBPF foundation☆28Dec 3, 2025Updated 4 months ago
- Python scripts for converting trace log messages to sequence diagrams. Visually debug trace logs.☆34Jan 11, 2023Updated 3 years ago
- ☆36Mar 5, 2026Updated last month
- We want to create a Repo which can provide different Malwares wrote by Python.☆27May 26, 2025Updated 10 months ago
- Raspberry PI Vulnerability Study using Flask, PWA VueJS 2, Requests, Vue-Socket.io and Flask SocketIO☆27Nov 21, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆25May 15, 2023Updated 2 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆22Nov 12, 2016Updated 9 years ago
- Lets you lay out people on a drop-line genealogical chart.☆32Sep 7, 2025Updated 7 months ago
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆48Apr 2, 2026Updated last week
- Labs for Threat Modelling training delivered by ControlPlane☆35Mar 25, 2026Updated 2 weeks ago
- Python Toolkit containing different Cyber Attacks Tools☆27Nov 4, 2023Updated 2 years ago
- A tool to automatically detect copy+pasted and vendored code between repositories☆76Apr 1, 2026Updated last week