Tox protocol.
• Tox is a protocol for decentralized text, voice and video communication on the Internet based on asymmetric encryption.
Tox protocol.
• Tox is a protocol for decentralized text, voice and video communication on the Internet based on asymmetric encryption.
We design logos using AI
The Launchaco tool will create a logo for your company at the speed of light. It's perfect for startups that don't have the budget or time to create a logo.
We use the service for data parsing
The Web Scraper service is regulated in a visual editor, through extensions to browsers (Firefox and Chrome), you just need to specify which elements you want to capture and the name of the fields.
Creating a beautiful newsletter
With the Revue service, you can monetize a loyal audience through digital subscriptions, sponsorship, advertising, or other business models.
You select the materials, Revue makes an excellent pitch.
We program in different languages
Available service Repl.it on the IDE for collaboration in the browser to code in more than 50 languages, including Python, Ruby, jаvascript, Java and many others.
Runlike
Given an existing Docker container, outputs the command line required to run a copy of it. Along with all these annoying parameters (ports, links, volumes, ...).
bpytop
A nice, beautiful alternative to htop, for monitoring your system.
bpytop is the same popular top++ but rewritten in python, from the original author.
Anthias
Anthias is a free and open source digital signage management software.
Distributed as a Raspberry Pi image. And it will turn any TV into a powerful digital sign.
Mortify
Morsify is a library for converting text to Morse Code or vice versa.
Supports Latin and Cyrillic. Can generate a file in the format .wav
Fireball
Firejail is a sandbox program for isolated execution of graphical, console and server applications, which minimizes the risk of compromising the main system when running untrustworthy or potentially vulnerable programs.
👨💻 Purple Team.
• Purple Team — Helps the Red Team and Blue Team to be friends with each other, allowing the blue team to develop a strategy and technical measures to protect the infrastructure based on the vulnerabilities and shortcomings discovered by the red team. The task of such a team is to ensure and maximize the efficiency of all teams.
👤 OSINT. Search for a target by username.
• You've probably already encountered a service for finding a target using the username "whatsmyname", and if you haven't, be sure to pay attention. Recently, this resource has been updated and now we can search for information on the username on 576 popular sites. There is also an opportunity to search through the list of usernames, rather than going through the information for each individual query and re-perform the search.
The evolution of cybercrime. Analysis, trends and forecasts 2023.
• Group-IB has published an annual flagship report on current trends in cybersecurity and forecasts of the evolution of the threat landscape. In short, the direction of ransomware will retain its leadership in the ranking of cyber threats to business.
👨🏻💻 Steganography. Useful tools and resources.
• Steganography — for the first time this term was mentioned in 1499, and even then this word meant the transmission of information by keeping the fact of transmission secret. Oddly enough, nowadays steganography has not received widespread recognition among hackers, although it cannot be said that it has not been resorted to at all.
💬 true story... How I was hacked, my cryptocurrency wallets were emptied, and what Apple said.
• The story of how the creator of the website for job search in the field of cryptocurrencies cryptojobslist withdrew personal savings in cryptocurrency, simultaneously gaining access to Apple, Yahoo, Gmail and Telegram accounts with two-factor authentication enabled.