-
7 MILES Technologies.
- KAMPALA,UGANDA
- ik777.websites.co.in
Lists (2)
Sort Name ascending (A-Z)
Starred repositories
Best Practices, code samples, and documentation for Computer Vision.
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
quicmap is a simple yet quic (!) QUIC protocol scanner
Steal Telegram Session bypass 2fa using powershell script
📦🔐 A lightweight Node.js private proxy registry
swagkarna / geospy
Forked from bitPanG98/GeoSpyGeolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the wo…
https://wiki.seeedstudio.com/Getting_Started Seeed Studio Wiki source code
Find, verify, and analyze leaked credentials
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
vhvb1989 / cinest
Forked from savannahostrowski/cinest🎥 An AI-powered movie suggestion engine, built with love and Azure
A repository of curated datasets from various attacks
This repository is for active development of the Azure SDK for Embedded C. For consumers of the SDK we recommend visiting our versioned developer docs at https://azure.github.io/azure-sdk-for-c.
Lab using MongoDB with Python (PyMongo driver). Created for educational use by the MongoDB for Academia program.
The DevEx & Application-layer for your Internal Developer Platform ⛵
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Software Vulnerabilities to Weakness Mapping
A tool to recover from ESXiArgs ransomware