Dataset fingerprinting for AIBOM
☆16Apr 8, 2026Updated last month
Alternatives and similar repositories for datasig
Users that are interested in datasig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆24Apr 27, 2026Updated 3 weeks ago
- A collection of awesome software, libraries and frameworks, design and architecture principles, books and videos, important resources and…☆13Aug 8, 2023Updated 2 years ago
- TEE-hosted binaries for verifiable server-side computation.☆22Updated this week
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated last year
- ☆24Nov 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An intuitive library to plot evaluation metrics.☆17Oct 22, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Security plugin for OpenClaw agents - prevents secret leaks, PII exposure, and destructive command execution☆86May 12, 2026Updated last week
- ☆43Apr 28, 2026Updated 3 weeks ago
- CHIP-8 emulator in Rust☆15Dec 15, 2018Updated 7 years ago
- CompChomper is a framework for measuring how LLMs perform at code completion.☆21Apr 29, 2025Updated last year
- Windows Minidump loader for Ghidra☆29Sep 30, 2022Updated 3 years ago
- Schema-aware JSON compression with millisecond lookups — cut transfer/storage while enabling exists /pos queries. (Demo + wheels; core is…☆24Feb 21, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Pytorch implementation of the SN-PatchGAN inpainter.☆13Feb 24, 2021Updated 5 years ago
- Modified colab notebook to train StyleGAN3 on Google Colab☆12Apr 3, 2022Updated 4 years ago
- Take any MS SQL Server table or view, export the data as a JSON file☆18Apr 25, 2016Updated 10 years ago
- The OWASP SAMM Website☆11Apr 21, 2026Updated 3 weeks ago
- ☆43Aug 27, 2025Updated 8 months ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆20Jun 15, 2020Updated 5 years ago
- Real-time monitoring, object tracking, and line-crossing detection for CCTV camera streams.☆24Feb 24, 2025Updated last year
- Run Bash and Linux Binaries on Windows☆12Jun 24, 2025Updated 10 months ago
- An unofficial GUI wrapper around pwndbg intended to leverage the UI benefits of a graphical user interface☆23Jul 11, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆36Apr 29, 2025Updated last year
- An MCP server for the x64dbg debugger☆32Mar 30, 2025Updated last year
- ☆26Aug 31, 2023Updated 2 years ago
- ☆17Jun 22, 2024Updated last year
- Human Pose Estimation using YOLOv9☆18Mar 23, 2024Updated 2 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- ☆22Feb 14, 2020Updated 6 years ago
- This directory focuses exclusively on Threat Modeling Tools—software, code, libraries, or services that automate, guide, or support the d…☆22May 2, 2026Updated 2 weeks ago
- REPL that uses RAG as it's context assembly☆28Aug 25, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Easily explore, manage, and interact with your local Ollama models.☆12Jul 18, 2024Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated 2 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Feb 14, 2021Updated 5 years ago
- ☆16May 29, 2024Updated last year
- Implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!"☆26Jun 11, 2024Updated last year
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- Abstract encoding API of libsodium crypto_secretstream☆23Apr 5, 2022Updated 4 years ago