This site aggregates publicly-available information about think tanks, academic centers, and advocacy groups funded by Big Tech (e.g. Google, Amazon, Apple, and Facebook). We organize this information and build useful tools like our browser extension, which adds disclosures to Big Tech-funded accounts on Twitter.
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidences.
Warning: this tool has been released as a forensic tool for a technical audience. Using it requires some technical skills such as understanding basics of forensic analysis and using command line tools.
A collection of stuff for finding and indexing open directories of files.
dialup.world is (currently) a three-line dial-up ISP!
This program transmits radio on computers / phones without radio transmitting hardware.
webhook is a lightweight configurable tool written in Go, that allows you to easily create HTTP endpoints (hooks) on your server, which you can use to execute configured commands. You can also pass data from the HTTP request (such as headers, payload or query variables) to your commands. webhook also allows you to specify rules which have to be satisfied in order for the hook to be triggered.
How to add support for configuration files to your shell scripts.
Evil Crow RF device. Contribute to joelsernamoreno/EvilCrow-RF development by creating an account on GitHub.
Maddy Mail Server implements all functionality required to run a e-mail server. It can send messages via SMTP (works as MTA), accept messages via SMTP (works as MX) and store messages while providing access to them via IMAP. In addition to that it implements auxiliary protocols that are mandatory to keep email reasonably secure (DKIM, SPF, DMARC, DANE, MTA-STS).
It replaces Postfix, Dovecot, OpenDKIM, OpenSPF, OpenDMARC and more with one daemon with uniform configuration and minimal maintenance cost.
Full re-implementation in Go.
hexyl is a simple hex viewer for the terminal. It uses a colored output to distinguish different categories of bytes (NULL bytes, printable ASCII characters, ASCII whitespace characters, other ASCII characters and non-ASCII).
In Depth Music is an independent online music library focusing on late 70’s and 80’s music genres such as post-punk, new wave, indie rock, and many more genres from that time. You can for example easily discover new bands which used to be difficult to find. Each band has their own band page with important information and discography.
In Depth Music are also focusing on 90’s, 2000’s, 2010's and present post-punk, gothic rock, deathrock, darkwave and other independent/alternative music genres that existed from late 70’s & 80’s. There are separate lists of these bands on the website, where you can find links to their band website, Facebook and Bandcamp.
Covert Instruments is a disruptive force in the fields of covert entry and locksport. Because our principals are experienced leaders in these fields, we are in a unique position to develop and produce tools that will be appreciated by both professionals and hobbyists alike. Our philosophy is a simple one: create tools that are a cut above their peers in conception, production, and function. We believe in superior functionality, concealable design, and multiple uses. If you want that old black leather case with the gold zipper, you have come to the wrong place. Our tools stand on their own merit and will serve you well whether you are a tier 1 operator, locksmith, or a hobbyist. We will work tirelessly to be the standard that others try to emulate.
The Lockpicking Lawyer is one of these designers.
In this article, I will take you through an explanation and implementation of all Machine Learning algorithms with Python programming language.
Machine learning algorithms are a set of instructions for a computer on how to interact with, manipulate, and transform data. There are so many types of machine learning algorithms. Selecting the right algorithm is both science and art.
3563 links, including 141 private