Lists (2)
Sort Name ascending (A-Z)
Stars
Transparent and Efficient Financial Analysis
Catalogue all images of a Kubernetes cluster to multiple targets with Syft
IAMCheck allows you to verify properties of AWS IAM policies.
A curated list of NLP resources for Hungarian
Replication package for Mining Input Grammars From Dynamic Control Flow
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…
Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.
Ceph is a distributed object, block, and file storage platform
A place to discuss potential projects for students of the ISIS Lab.