"The Cyphernomicon" is a document written by Timothy C. May in 1994 for the Cypherpunks electronic mailing list, outlining some ideas behind, and the effects of, crypto-anarchism. It constitutes one of the philosophy's founding documents, advocating anonymous digital currency and electronic privacy, and touching on more esoteric topics, such as assassination markets.
Updated 2023-02-02 17:36:16 +00:00
Written by Wei Dai in 1998
Updated 2023-02-05 01:05:08 +00:00
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
Updated 2024-02-18 13:59:45 +00:00
Curated list of ChatGPT related resource, tools, prompts, apps / ChatGPT
Updated 2023-03-12 13:09:58 +00:00
Awesome list of resources related to container security
Updated 2020-06-27 19:06:08 +00:00
A curated list of hacking environments where you can train your cyber skills legally and safely
Updated 2023-04-19 13:25:53 +00:00
A curated list of awesome decentralized finance projects
Updated 2019-04-23 20:01:16 +00:00
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Updated 2023-07-04 07:23:42 +00:00
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Updated 2024-05-13 14:15:36 +00:00
A curated list of awesome Linux Containers frameworks, libraries and software
Updated 2023-07-17 08:58:02 +00:00
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Updated 2021-01-20 11:58:06 +00:00
A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources)
Updated 2024-02-18 21:27:18 +00:00
Curated list of awesome resources for the Stable Diffusion AI Model.
Updated 2023-02-06 16:37:25 +00:00
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
Updated 2023-07-15 21:05:38 +00:00
Code for CodeT5: a new code-aware pre-trained encoder-decoder model.
Updated 2023-07-21 03:46:28 +00:00
Here we collect and discuss the best DeFi, Blockchain and crypto-related OpSec researches and data terminals - contributions are welcome.
Updated 2024-02-19 03:51:48 +00:00