Projects with this topic
-
Cybersecurity for everyone.
Updated -
✭ MAGNETRON ™ ✭: YOLOv5
🚀 in PyTorch > ONNX > CoreML > TFLiteUpdated -
⭐ The famous XWorm RAT, version 2.1. Educational purposes onlyUpdated -
Project template with a list of development tasks created following Security by Design practices, tactics, government guidelines and OWASP Cheat Sheets
Updated -
✭ MAGNETRON ™ ✭: Read-only mirror of Wireshark's Git repository at https://gitlab.com/wireshark/wireshark. GitHub won't let us disable pull requests. ☞ THEY WILL BE IGNORED HERE ☜ Please upload them at GitLab.
Updated -
Shell script to securely wipe specific files or folders, or cover your tracks on UNIX systems. Designed for private people...
Updated -
mdbook website for keeping notes about technology
mirror of https://git.sr.ht/~atomicfs/white-hat
Updated -
Wessus identifies vulnerabilities in websites identifying technologies and checking related CVE for the specific version.
Updated -
A project dedicated to teaching beginners and non-tech-savvy people about digital privacy and cybersecurity.
Updated -
Wcheck is a Python-based, proxy-style Web Application Firewall (WAF) designed to inspect and filter all HTTP and HTTPS traffic. At its core is a fully custom-built private DNS server, developed specifically for Wcheck. This DNS server redirects designated client domains to the Wcheck proxy, enabling full man-in-the-middle inspection. The result is seamless traffic analysis, filtering, and logging at both the DNS and HTTP/S layers.
Updated -
Les voyages en Cybérie sont une série de présentations autour de la cybersécurité et du logiciel libre. https://florent_tassy.gitlab.io/voyages-en-cyberie
Updated -
Hardwired DNS encryption application for maximized security.
Updated -
Kunstinstallation zur Verstaerkung des Sicherheitsgefuehl im Hacklabor auf Basis eines ESP und WS2812 #Cybersecurity
Updated -
-
linux hardening script for CyberPatriot
Updated -
Open security analytics.
Updated -
Thunderbird user.js hardening by CHEF-KOCH
UpdatedUpdated -
Adversaries have their cards, You have your cards. Using a threat modeling framework determine whether you have an edge over adversaries or if improvement is needed.
Updated -
The hacker technical cheat sheet - Mirrored from https://github.com/noraj/the-hacking-trove
Updated -