"The Cyphernomicon" is a document written by Timothy C. May in 1994 for the Cypherpunks electronic mailing list, outlining some ideas behind, and the effects of, crypto-anarchism. It constitutes one of the philosophy's founding documents, advocating anonymous digital currency and electronic privacy, and touching on more esoteric topics, such as assassination markets.
Updated 2023-02-02 17:36:16 +00:00
The Generative AI Landscape - A Collection of Awesome Generative AI Applications
awesome-list
awesome
artificial-intelligence
assistant-chat-bots
assistive-technology
collections
generative-art
generative-design
generative-music
generative-testing
generative-text
software-development
ai
Updated 2024-05-15 06:31:35 +00:00
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
awesome-list
awesome
security
awesome-lists
security-tools
cloud-security
aws
aws-security
aws-auditing
aws-security-automation
aws-security-resources
Updated 2024-02-18 13:59:45 +00:00
Curated list of resources for the development and applications of blockchain.
awesome-list
awesome
ipfs
bulletproofs
digital-currency
dpos
eos
eosio
ethereum
fabric
iota
mastering-bitcoin
mastering-ethereum
monero
pbft
pos
pow
white-paper
bitcoin
blockchain
Updated 2023-04-03 07:46:42 +00:00
Awesome list of resources related to container security
Updated 2020-06-27 19:06:08 +00:00
A curated list of hacking environments where you can train your cyber skills legally and safely
Updated 2023-04-19 13:25:53 +00:00
A curated list of awesome decentralized finance projects
Updated 2019-04-23 20:01:16 +00:00
A curated list of Docker resources and projects
awesome-list
awesome
list
docker
docker-deployment
docker-environment
docker-image
docker-machine
docker-monitoring
docker-registry
docker-security
docker-swarm
dockerfile
moby
tools
container
docker-api
docker-container
Updated 2024-05-15 04:47:50 +00:00
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Updated 2023-07-04 07:23:42 +00:00
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
awesome-list
awesome
security
hacking
awesome-lists
security-tools
osint
vulnerability
exploit
search-engine
vulnerabilities
wifi-network
bugbounty
cve
dns
domain
hacking-tools
osint-tool
redteam
redteaming
Updated 2024-05-13 14:15:36 +00:00
A curated list of awesome Linux Containers frameworks, libraries and software
Updated 2023-07-17 08:58:02 +00:00
A curated list of awesome malware analysis tools and resources.
awesome-list
awesome
list
chinese-translation
domain-analysis
drop-ice
dynamic-analysis
malware-analysis
malware-collection
malware-research
malware-samples
network-traffic
static-analysis
threat-intelligence
threat-sharing
analysis-framework
threatintel
automated-analysis
chinese
Updated 2024-05-09 01:44:52 +00:00
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
awesome-list
awesome
hacking
resources
security-tools
bugbounty
hacking-tools
android
pentesting
redteam
android-security
ios
ios-security
mobile
mobile-security
reverse-engineering
Updated 2021-01-20 11:58:06 +00:00
A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources)
Updated 2024-02-18 21:27:18 +00:00
Curated list of awesome resources for the Stable Diffusion AI Model.
Updated 2023-02-06 16:37:25 +00:00
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
awesome-list
awesome
devsecops
devsecops-university
practical-devsecops
security-review
threat-modeling
appsec
Updated 2023-07-15 21:05:38 +00:00
Code for CodeT5: a new code-aware pre-trained encoder-decoder model.
Updated 2023-07-21 03:46:28 +00:00
Here we collect and discuss the best DeFi, Blockchain and crypto-related OpSec researches and data terminals - contributions are welcome.
Updated 2024-02-19 03:51:48 +00:00