Stars
Lab Materials for MIT 6.S191: Introduction to Deep Learning
The Java gRPC implementation. HTTP/2 based RPC
Very simple prototype of identity model
Identidock Example Application from Using Docker
Code for "Logging and Monitoring" chapter of Using Docker
This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)
Javascript bindings for the Solidity compiler
No Coin is a tiny browser extension aiming to block coin miners such as Coinhive.
CoinHive cryptocurrency miner for node.js
A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless or flying distance, creating an army of zombie drones under y…
Code for Chapter 7, Autonomous Drone
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Jenkins plugin for pipeline visualisation, perfect for Continuous Delivery
Audio fingerprinting and recognition in Python
Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)
3D reproduction of TSA Master keys
Chromium OS Universal Chroot Environment (EOL)
DEPRECATED Heroku Toolbelt plugin to help configure, test and release apps to Heroku using local containers.
DEPRECATED: Data collection and processing made easy.