ukama / ukama-nodesView external linksLinks
Ukama hardware stuff
☆32Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for ukama-nodes
Users that are interested in ukama-nodes are comparing it to the libraries listed below
Sorting:
- Ukama's open-source cellular network☆124Updated this week
- golang UDP and TCP traceroute☆16Apr 21, 2021Updated 4 years ago
- Authoritative CoreDNS on Fly.io☆15May 31, 2021Updated 4 years ago
- Serverless Optimized MODules - A Serverless Framework to create reusable micro apps☆18Jul 7, 2025Updated 7 months ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Arduino-based microcontroller to stabilize model and high power rockets.☆14Aug 9, 2012Updated 13 years ago
- ☆15Feb 7, 2025Updated last year
- Plinky web interface☆11Jun 4, 2021Updated 4 years ago
- Arduino interface to MCS-12085/12086 Optical Mouse Sensor☆19Oct 12, 2012Updated 13 years ago
- ☆17Updated this week
- An active RFID system for locating free roaming pets / wildlife.☆10Jul 22, 2023Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 3 weeks ago
- Cam interface to FPGA using ADV7180☆13Jun 7, 2015Updated 10 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Landing page for Global Privacy Control (GPC)☆12Feb 1, 2026Updated last week
- CONFSEC's ComputeNode component of the OpenPCC standard☆17Dec 15, 2025Updated last month
- ☆11Jun 28, 2016Updated 9 years ago
- Empowering journalists and whistleblowers☆20Oct 16, 2021Updated 4 years ago
- Privateer plugin for scanning the security hygiene of a GitHub repository.☆18Feb 4, 2026Updated last week
- Go benchmarking utility for examining GC performance. Generates configurable amounts of heap, including leaks. Can simulate various appli…☆25Mar 21, 2025Updated 10 months ago
- ☆10May 6, 2023Updated 2 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Minecraft Mod (Fabric Modloader) for 1.16.1 and above.☆10Oct 27, 2023Updated 2 years ago
- Kubernetes Network Attachment Provider☆13Jul 4, 2023Updated 2 years ago
- vim commands for git-appraise (WIP)☆11Jan 17, 2016Updated 10 years ago
- Sealed boxes implementation for Rust/WebAssembly.☆17May 9, 2024Updated last year
- CLI tool to analyze APKs☆42Mar 28, 2024Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- 255 instructions sequencer☆10Jul 1, 2019Updated 6 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Sep 2, 2025Updated 5 months ago
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- ☆16Updated this week
- Troubleshooting tool for docker and kubernetes networking☆12Jun 28, 2021Updated 4 years ago
- Control ONVIF-compliant PTZ camera with a USB joystick from Python☆11Dec 17, 2022Updated 3 years ago
- 🖥 Say Goodbye To Ads With Deepguard, A Comprehensive And Organized Block List To Block Ads, Malware, Fake News, Improve Security, Priva…☆10Feb 8, 2022Updated 4 years ago
- ☆15Jul 23, 2025Updated 6 months ago
- Deep equal with no deps and only for 'data' objects, ie basic objects, arrays, primitives and typed arrays☆18Oct 6, 2025Updated 4 months ago
- A simple stateful operator for managing creation, backup, and restore of PostgreSQL clusters.☆13Apr 10, 2019Updated 6 years ago