Stars
A source-available invoice, quote, project and time-tracking app built with Laravel
Bitcoin Wallet strongly focused on privacy when transacting on the bitcoin network
Decentralized P2P exchange platform built on Monero and Tor
retoaccess1 / haveno-reto
Forked from haveno-dex/havenoDecentralized P2P exchange built on Monero and Tor
Toxme tox dns service for Tox, implemented in php, very easy setup. Run on most php webhostings. No database, you must add tox id directly to source code.
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Consulta de placas de veículos na base de dados do SINESP Cidadão sem a necessidade do preenchimento de captchas
cryptonotefoundation / cryptonote
Forked from amjuarez/bytecoinCryptoNote protocol implementation. This is the reference repository for starting a new CryptoNote currency. See /src/cryptonote_config.h
Ethlance is the first job market platform built entirely on the Ethereum blockchain. Free to use forever!
Create On Demand Disposable OpenVPN Endpoints on AWS.
Home of the Cicada Direct Democracy and Dapp Platform
Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these s…
A jQuery Plugin to make masks on form fields and HTML elements.
Create Your Own Broadcast Network With AVideo Platform Open-Source. OAVP OVP
Jobskee is an open source job board built using PHP and MySQL (http://jobskee.com)
LUKS Remote Key Unlock (luksrku) is a client/server utility that allows to remotely unlock LUKS (root) filesystems using TLS
several different,useful php scripts and functions
Material Design Components in HTML/CSS/JS
A platform for community discussion. Free, open, simple.
Produces persistent, respawning "super" cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they've removed standard cookies and other privacy data such as Fl…
Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced resurrection of ProxyHam)