thakur2309 / GEOVAULTView external linksLinks
☆23Nov 13, 2025Updated 3 months ago
Alternatives and similar repositories for GEOVAULT
Users that are interested in GEOVAULT are comparing it to the libraries listed below
Sorting:
- ☆20Aug 6, 2025Updated 6 months ago
- ☆56Aug 11, 2025Updated 6 months ago
- ☆56May 20, 2025Updated 8 months ago
- ☆43Sep 26, 2025Updated 4 months ago
- ☆29May 29, 2025Updated 8 months ago
- ☆38Jun 28, 2025Updated 7 months ago
- ☆44Jan 25, 2026Updated 3 weeks ago
- ☆22Oct 3, 2025Updated 4 months ago
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- Sage Math recompiled to run on the Raspberry Pi☆15Oct 9, 2015Updated 10 years ago
- Sincryption Panel Sincryption Panel is like checker tool for checking if a person is part of a specific group is verified or not | And p…☆14Oct 22, 2024Updated last year
- OpenSelfie is an Open Source (hardware and software) photobooth based on the Raspberry Pi and Wyolum's AlaMode☆15Oct 15, 2015Updated 10 years ago
- SMS flooding tool☆22May 3, 2025Updated 9 months ago
- ☆21Apr 21, 2025Updated 9 months ago
- Protect Your Secrets. Forever. Ultra-secure notes powered by blockchain.☆13Apr 29, 2025Updated 9 months ago
- Repository for the family history/pedigree project☆13Feb 8, 2023Updated 3 years ago
- Shoot and View utility for Transcend WiFi SD card for Windows, Mac and linux.☆11May 16, 2022Updated 3 years ago
- ☆12Sep 28, 2025Updated 4 months ago
- Mender over-the-air software updater client for microcontrollers (MCUs).☆17Updated this week
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- facebook bruteforce tool☆10Dec 3, 2023Updated 2 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- WiFi Hacking Suite☆30Feb 9, 2026Updated last week
- MySQL UDF for inserting data into MongoDB☆16Feb 3, 2012Updated 14 years ago
- Replication materials for "Identifying the Development and Application of Artificial Intelligence in Scientific Text"☆13Feb 18, 2020Updated 5 years ago
- Python implementation of the Abelian Sandpile Model (Per Bak, Chao Tang, & Kurt Wiesenfeld, 1987)☆10Apr 19, 2015Updated 10 years ago
- ☆27Dec 18, 2025Updated last month
- sample implementation of deeploco☆15Nov 5, 2018Updated 7 years ago
- ESP32_CAM meets Etch-A-Sketch => Etch-a-Selfie☆12Jul 30, 2019Updated 6 years ago
- Web client (static HTML and Javascript) built with Google Web Toolkit☆44Jul 21, 2011Updated 14 years ago
- ☆12Jan 17, 2026Updated 3 weeks ago
- An application that generates art by inserting text at random points in the image file.☆12Apr 4, 2012Updated 13 years ago
- Open-source keyboard firmware for Atmel AVR and Arm USB families☆14Jul 30, 2024Updated last year
- Encrypted Messaging Protocol Reference Implementation☆26Nov 14, 2017Updated 8 years ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆40Jun 16, 2025Updated 7 months ago
- ☆10Oct 6, 2020Updated 5 years ago
- Secure decentralized hierarchical coordination platform☆22Nov 19, 2022Updated 3 years ago
- Ver 1.1 by Mike Tucker / published by CreativeApplications.Net☆17Jul 12, 2011Updated 14 years ago
- Official Black Hat Arsenal Security Tools Repository☆10Aug 12, 2017Updated 8 years ago