Dataset fingerprinting for AIBOM
☆15Mar 30, 2026Updated last week
Alternatives and similar repositories for datasig
Users that are interested in datasig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A collection of awesome software, libraries and frameworks, design and architecture principles, books and videos, important resources and…☆13Aug 8, 2023Updated 2 years ago
- TEE-hosted binaries for verifiable server-side computation.☆21Updated this week
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 11 months ago
- Security plugin for OpenClaw agents - prevents secret leaks, PII exposure, and destructive command execution☆67Apr 1, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆24Nov 19, 2024Updated last year
- An intuitive library to plot evaluation metrics.☆17Oct 22, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- ☆35Mar 13, 2026Updated 3 weeks ago
- CHIP-8 emulator in Rust☆15Dec 15, 2018Updated 7 years ago
- CompChomper is a framework for measuring how LLMs perform at code completion.☆21Apr 29, 2025Updated 11 months ago
- Windows Minidump loader for Ghidra☆29Sep 30, 2022Updated 3 years ago
- Schema-aware JSON compression with millisecond lookups — cut transfer/storage while enabling exists /pos queries. (Demo + wheels; core is…☆24Feb 21, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Pytorch implementation of the SN-PatchGAN inpainter.☆13Feb 24, 2021Updated 5 years ago
- Modified colab notebook to train StyleGAN3 on Google Colab☆12Apr 3, 2022Updated 4 years ago
- Take any MS SQL Server table or view, export the data as a JSON file☆18Apr 25, 2016Updated 9 years ago
- The OWASP SAMM Website☆11Mar 25, 2026Updated 2 weeks ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆20Jun 15, 2020Updated 5 years ago
- ☆43Aug 27, 2025Updated 7 months ago
- Real-time monitoring, object tracking, and line-crossing detection for CCTV camera streams.☆23Feb 24, 2025Updated last year
- Run Bash and Linux Binaries on Windows☆12Jun 24, 2025Updated 9 months ago
- An unofficial GUI wrapper around pwndbg intended to leverage the UI benefits of a graphical user interface☆23Jul 11, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆36Apr 29, 2025Updated 11 months ago
- An MCP server for the x64dbg debugger☆31Mar 30, 2025Updated last year
- ☆26Aug 31, 2023Updated 2 years ago
- Human Pose Estimation using YOLOv9☆18Mar 23, 2024Updated 2 years ago
- ☆17Jun 22, 2024Updated last year
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- ☆22Feb 14, 2020Updated 6 years ago
- REPL that uses RAG as it's context assembly☆28Aug 25, 2024Updated last year
- Easily explore, manage, and interact with your local Ollama models.☆12Jul 18, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- 100% XXTEA authenticated, chunked file encryption☆18Feb 14, 2021Updated 5 years ago
- ☆16May 29, 2024Updated last year
- Implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!"☆25Jun 11, 2024Updated last year
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- Abstract encoding API of libsodium crypto_secretstream☆23Apr 5, 2022Updated 4 years ago
- ☆17Sep 20, 2025Updated 6 months ago