A compiled checklist of 300+ tips for protecting digital security and privacy in 2022
awesome-list
awesome
security
privacy
hacktoberfest
surveillance
privacy-protection
cybersecurity
open-source
web-browsing
censorship
checklist
defense
hacktoberfest2022
protection
security-tools
Updated 2024-04-28 02:04:52 +00:00
Nginx webserver and reverse proxy with php support and a built-in Certbot (Let's Encrypt) client. It also contains fail2ban for intrusion prevention.
Updated 2024-04-27 03:19:53 +00:00
Invidious is an alternative front-end to YouTube
Updated 2024-04-26 22:17:01 +00:00
Invidious is an alternative front-end to YouTube
Updated 2024-04-26 22:17:01 +00:00
All Qubes OS Project documentation pages are stored as plain text files in this dedicated repository. By cloning and regularly pulling from this repo, users can maintain their own up-to-date offline copy of all Qubes documentation rather than relying solely on the Web.
Updated 2024-04-26 13:10:38 +00:00
A simple matrix bot that supports chatting with ChatGPT, Bing AI, Google Bard
matrix
chatgpt
python
chatbot
bot
matrix-dendrite
matrix-nio
matrix-synapse
bing-ai
bing-image-creator
google-bard
gpt3-turbo
Updated 2024-04-26 10:15:23 +00:00
A practical approach to Privacy and Security
Updated 2024-04-26 05:32:31 +00:00
The Patterns of Scalable, Reliable, and Performant Large-Scale Systems
awesome-list
awesome
devops
computer-science
resources
lists
interview
interview-practice
interview-questions
machine-learning
programming
scalability
system
system-design
web-development
architecture
backend
big-data
design-patterns
distributed-systems
Updated 2024-04-25 23:17:33 +00:00
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
awesome-list
hacking
awesome-lists
cybersecurity
ethical-hacking
ethicalhacking
exploit
exploit-development
exploits
hacker
hackers
hacking-series
penetration-testing
training
video-course
vulnerability
vulnerability-assessment
vulnerability-identification
vulnerability-management
vulnerability-scanners
Updated 2024-04-25 14:19:32 +00:00
Board designs, FPGA verilog, firmware for TKey, the flexible and open USB security key
Updated 2024-04-25 12:12:48 +00:00
The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
Updated 2024-04-25 11:01:47 +00:00
An Awesome List for getting started with web archiving
Updated 2024-04-25 08:43:26 +00:00
Long list of geospatial tools and resources
awesome-list
awesome
machine-learning
earth-observation
geoprocessing
geospatial
geospatial-analysis
geotools
gis
map
remote-sensing
spatial-analysis
spatial-data
data-analysis
deep-learning
Updated 2024-04-25 08:31:26 +00:00
Thunderbird privacy, security and anti-fingerprinting: a comprehensive user.js template for configuration and hardening
Updated 2024-04-24 21:32:01 +00:00
A curated list of awesome malware analysis tools and resources.
awesome-list
awesome
list
chinese-translation
domain-analysis
drop-ice
dynamic-analysis
malware-analysis
malware-collection
malware-research
malware-samples
network-traffic
static-analysis
threat-intelligence
threat-sharing
analysis-framework
threatintel
automated-analysis
chinese
Updated 2024-04-24 13:43:47 +00:00
A curated list of command line apps
Updated 2024-04-24 06:59:39 +00:00
My OCI image for Synapse, a Matrix server implementation.
Updated 2024-04-24 00:14:43 +00:00
My OCI image for Synapse, a Matrix server implementation and Mjolnir module.
Updated 2024-04-24 00:14:10 +00:00