Network security and instrumentalization

Network security and instrumentalization

2022-10-09 0 1,425
Resource Number 44824 Last Updated 2025-02-24
¥ 0HKD Upgrade VIP
Download Now Matters needing attention
Can't download? Please contact customer service to submit a link error!
Value-added Service: Installation Guide Environment Configuration Secondary Development Template Modification Source Code Installation

In this issue, we sorted out several items that were hot in March, including network, backend, database, visualization tools, etc.

Network security and instrumentalization插图

SmartKnob

SmartKnob is an open source input device with a software-configurable brake and virtual locator. A brushless gimp motor is paired with a magnetic encoder to provide closed-loop torque feedback control so that the feel of the ratchet and limiter can be dynamically created and adjusted. Although this is a “DIY” open source project, it is not yet a full-fledged plug and play project. If you intend to build it yourself, note that it requires advanced welding experience to build – surface mount soldering with very small spacing is required (reflow or hot air is recommended), and assembly is time-consuming and delicate.

Open source: Apache

Project address:
https://github.com/scottbez1/smartknob

Network security and instrumentalization插图1

OpenBB terminal

OpenBB Terminal provides a modern integrated Python-based environment for investment research, enabling the average retail trader to leverage state of the art data science and machine learning techniques. As a modern Python-based environment, OpenBBTerminal is open to data science (Pandas, Numpy, Scipy, Jupyter), machine learning (Pytorch, Tensorflow, Sklearn, Flair) and data acquisition (Beautiful Soup, etc.) Access to Python databases. Third-party apis).

Open source License: MIT License

Project address:
https://github.com/OpenBB-finance/OpenBBTerminal

Network security and instrumentalization插图2

hackingtool

hackingtool as an all-in-one tool set for hackers, can help us better understand some network attack and defense related knowledge. The tool set mainly includes anonymous hiding tools, information collection tools, word generator, wireless attack tools, SQL injection tools, phishing attack tools, network attack tools, late exploitation tools, forensics tools, payload creation tools, reverse engineering tools using framework, DDOS attack tools, remote administrator tools, (RAT)XSS Attack tools, steganography tools, etc.

Network security and instrumentalization插图3

Open source License: MIT License

Project address:
https://github.com/Z4nzu/hackingtool

Terminal editor Helix

Helix is first a terminal-based editor that lets you explore a custom renderer (similar to emacs) in wgpu or skulpin, The tools include VIM-like modal editing, multiple selection, built-in language server support, intelligence via tree-sitter, incremental syntax highlighting, and code editing.

Network security and instrumentalization插图4

Open source: MPL-2.0 License

Project address:
https://github.com/helix-editor/helix

Grafana Mimir

Grafana claims to be the most scalable and high-performance open source temporal database in the world. Mimir supports scaling metrics to a billion or more, with simplified deployment, high availability, multi-tenancy, persistent storage, and ultra-fast query performance up to 40 times faster than Cortex. Mimir also includes some commercial features, such as infinite cardinality using horizontally scalable, “split” compressors, and fast, high-cardinality queries via sharded query engines.

Network security and instrumentalization插图5

Open source: AGPL-3.0 License

Project address:
https://github.com/grafana/mimir

Mastodon open source social network server

Mastodon is a free and open source social networking server based on ActivityPub, where users can follow their friends and discover new friends. On Mastodon, users can post anything they want: links, images, text, videos. All Mastodon servers can interoperate as a federated network (users on one server can communicate seamlessly with users on another server, including the non-Mastodon software that implements ActivityPub).

Network security and instrumentalization插图6

Open source: AGPL-3.0 License

Project address:
https://github.com/mastodon/mastodon

Kestra’s infinitely scalable orchestration and scheduling platform

Kestra is an infinitely scalable orchestration and scheduling platform that can create, run, schedule, and monitor millions of complex pipelines. Workflows can start simple and grow to more complex systems with branching, parallelism, dynamic tasks, process dependencies, and Kestra also has a built-in Web interface that allows you to create, run, and monitor all of your processes – no need to deploy your processes, just edit them.

5b21107ed93843b2bc6cb99a3ead3386noop.image_

Open source: Apache-2.0 License

Project address:
https://github.com/kestra-io/kestra

Peergos Private networks that end users can control

The foundation of

Peergos is a peer-to-peer encrypted global file system with fine-grained access controls designed to prevent monitoring of data content or friendship graphs. It will have a secure messenger, optional interoperability with email, and a fully private and secure social network where users can control who sees what (executed encrypted).

Network security and instrumentalization插图8

Open source: AGPL-3.0 License

Project address:
https://github.com/Peergos/Peergos

litestreamSQLite independent stream replication tool

Litestream is a stand-alone stream replication tool for SQLite. It runs as a background process and securely copies changes incrementally to another file or S3. Litestream only communicates with SQLite through the SQLite API, so it won’t damage your database.

Network security and instrumentalization插图9

Open source: Apache-2.0 License

Project address:
https://github.com/benbjohnson/litestream

Open source authentication provider

Add secure login and session management to your application. SDKS available for popular languages and front-end frameworks, such as Node.js, Go, Python, React.js, React Native, Vanilla JS, and others.

  • Local deployment so that you control 100% of the user data using your own database.
  • End-to-end solution with login, registration, user, and session management without all the complexities of the OAuth protocol.
  • Easy implementation and higher security.

Network security and instrumentalization插图10

Open source: Apache-2.0 License

Project address:
https://github.com/supertokens/supertokens-core

Hook framework LSPosed

The Riru/Zygisk module attempts to provide an ART hook framework that utilizes the LSPlant hook framework to provide an API consistent with OG Xposed. You can have multiple modules that can make changes to the same part of the system or application. For the modified APK, you must choose one. There is no way to combine them, unless the author has built multiple APKs with different combinations.

Network security and instrumentalization插图11

Open source: GPL-3.0 License

Project address:
https://github.com/LSPosed/LSPosed

Monitorian Windows desktop tool to easily adjust the brightness of multiple monitors

The user can change the brightness of the display individually or uniformly, including the brightness of the external display. For systems with ambient light sensors, the adjusted brightness can be displayed along with the configured brightness. In addition, users can seamlessly change the adjustable range of brightness and contrast of each display, the operation interface supports Chinese, and the display needs to turn on DDC/CI when using.

Network security and instrumentalization插图12

Open source license: View license

Project address:
https://github.com/emoacht/Monitorian

Lightweight plugin framework for ASP.NET Core

PluginCore mainly includes front-end automatic integration, two lines of code to complete the integration, each plug-in can add Controller, has its own route, You can apply for DI in the constructor method of the plug-in class that implements IPlugin, and of course, you can also apply DI in the Controller constructor method. You can embed extension points in the front end, and then insert widgets and other functions through the plug-in, which is very powerful.

Network security and instrumentalization插图13

Open source: Apache-2.0 License

Project address:
https://github.com/yiyungent/PluginCore

Free Windows screenshot recording tool

ShareX supports full-screen screenshots, rolling screenshots, detection window screenshots, GIF recording, etc. After screenshots, it also supports adding text, watermark, special effects, Mosaic, etc. Finally, it can directly upload pictures to get links, and complete the whole screenshot process smoothly.

Network security and instrumentalization插图14

Open source: GPL-3.0 License

Project address:
https://github.com/ShareX/ShareX

Gogs a self-service Git service that is easy to build

The

Gogs (/gɑgz/) project aims to build a simple, stable, and extensible self-service Git service in the easiest way possible. Development in Go enables Gogs to be distributed as a stand-alone binary and supports all platforms supported by Go, including Linux, macOS, Windows, and ARM platforms.

Network security and instrumentalization插图15

Open source License: MIT License

资源下载此资源为免费资源立即下载
Telegram:@John_Software

Disclaimer: This article is published by a third party and represents the views of the author only and has nothing to do with this website. This site does not make any guarantee or commitment to the authenticity, completeness and timeliness of this article and all or part of its content, please readers for reference only, and please verify the relevant content. The publication or republication of articles by this website for the purpose of conveying more information does not mean that it endorses its views or confirms its description, nor does it mean that this website is responsible for its authenticity.

Ictcoder Free Source Code Network security and instrumentalization https://ictcoder.com/network-security-and-instrumentalization/

Share free open-source source code

Q&A
  • 1. Automatic: After making an online payment, click the (Download) link to download the source code; 2. Manual: Contact the seller or the official to check if the template is consistent. Then, place an order and make payment online. The seller ships the goods, and both parties inspect and confirm that there are no issues. ICTcoder will then settle the payment for the seller. Note: Please ensure to place your order and make payment through ICTcoder. If you do not place your order and make payment through ICTcoder, and the seller sends fake source code or encounters any issues, ICTcoder will not assist in resolving them, nor can we guarantee your funds!
View details
  • 1. Default transaction cycle for source code: The seller manually ships the goods within 1-3 days. The amount paid by the user will be held in escrow by ICTcoder until 7 days after the transaction is completed and both parties confirm that there are no issues. ICTcoder will then settle with the seller. In case of any disputes, ICTcoder will have staff to assist in handling until the dispute is resolved or a refund is made! If the buyer places an order and makes payment not through ICTcoder, any issues and disputes have nothing to do with ICTcoder, and ICTcoder will not be responsible for any liabilities!
View details
  • 1. ICTcoder will permanently archive the transaction process between both parties and snapshots of the traded goods to ensure the authenticity, validity, and security of the transaction! 2. ICTcoder cannot guarantee services such as "permanent package updates" and "permanent technical support" after the merchant's commitment. Buyers are advised to identify these services on their own. If necessary, they can contact ICTcoder for assistance; 3. When both website demonstration and image demonstration exist in the source code, and the text descriptions of the website and images are inconsistent, the text description of the image shall prevail as the basis for dispute resolution (excluding special statements or agreements); 4. If there is no statement such as "no legal basis for refund" or similar content, any indication on the product that "once sold, no refunds will be supported" or other similar declarations shall be deemed invalid; 5. Before the buyer places an order and makes payment, the transaction details agreed upon by both parties via WhatsApp or email can also serve as the basis for dispute resolution (in case of any inconsistency between the agreement and the description of the conflict, the agreement shall prevail); 6. Since chat records and email records can serve as the basis for dispute resolution, both parties should only communicate with each other through the contact information left on the system when contacting each other, in order to prevent the other party from denying their own commitments. 7. Although the probability of disputes is low, it is essential to retain important information such as chat records, text messages, and email records, in case a dispute arises, so that ICTcoder can intervene quickly.
View details
  • 1. As a third-party intermediary platform, ICTcoder solely protects transaction security and the rights and interests of both buyers and sellers based on the transaction contract (product description, agreed content before the transaction); 2. For online trading projects not on the ICTcoder platform, any consequences are unrelated to this platform; regardless of the reason why the seller requests an offline transaction, please contact the administrator to report.
View details

Related Source code

ICTcoder Customer Service

24-hour online professional services