mihari Mihari is a helper to run queries & manage results continuously. Mihari can be used for C2, landing pages,...
Global Security News
Category Added in a WPeMatico Campaign
DefectDojo is an open-source application vulnerability correlation and security orchestration application. It allows you to manage your application security program,...
Wazuh Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and...
Caido Caido aims to help security professionals and enthusiasts audit web applications with efficiency and ease. Feature Sitemap The Sitemap...
The Bastion Bastions are a cluster of machines used as the unique entry point by operational teams (such as sysadmins,...
Velociraptor – Endpoint visibility and collection tool. Velociraptor is a unique, advanced open-source endpoint monitoring, digital forensic, and cyber response...
The idea of creating Web 3.0 has been around since the end of 2000s. The new version of the world...
ZK-SNARKs (Zero Knowledge Succinct Noninteractive ARguments of Knowledge) are one of the most promising new applied cryptography tools: proofs allow...
The generalized inverses of systematic non-square binary matrices have applications in mathematics, channel coding and decoding, navigation signals, machine learning,...
The Lattice Isomorphism Problem (LIP) is the computational task of recovering, assuming it exists, a orthogonal linear transformation sending one...