amrt1n3zm Goto Github PK
Name: Alejandro
Type: User
Bio: #blockchain #BTC #ETH #IOTA #infosec #systems
Location: Spain
Name: Alejandro
Type: User
Bio: #blockchain #BTC #ETH #IOTA #infosec #systems
Location: Spain
A wireshark dissector for the bitcoin protocol.
Bitcoin Improvement Proposals
Bitcoin Core integration/staging tree
a wireshark dissector for the bitcoin protocol
A wireshark dissector for the bitcoin protocol
Bitcoin wireshark 1.10.5 dissector with better support of the bitcoin protocol. Also DogeCoin/Litecoin support.
A wireshark dissector for the bitcoin protocol Google Colab
BTC + BitHub = An experiment in funding privacy OSS.
simple moneda cripto
java criptomoneda simple
A web-based demonstration of blockchain concepts.
las raices del bitcoin son profundas ya que reposa en hombros de gigantes
Browser Security Handbook Written and maintained by Michal Zalewski <[email protected]>. Copyright 2008, 2009 Google Inc, rights reserved. Released under terms and conditions of the CC-3.0-BY license. Table of Contents → Part 1: Basic concepts behind web browsers → Part 2: Standard browser security features → Part 3: Experimental and legacy security mechanisms Introduction Hello, and welcome to the Browser Security Handbook! This document is meant to provide web application developers, browser engineers, and information security researchers with a one-stop reference to key security properties of contemporary web browsers. Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities. Although all browsers implement roughly the same set of baseline features, there is relatively little standardization - or conformance to standards - when it comes to many of the less apparent implementation details. Furthermore, vendors routinely introduce proprietary tweaks or improvements that may interfere with existing features in non-obvious ways, and seldom provide a detailed discussion of potential problems. The current version of this document is based on the following versions of web browsers: | Browser | Version | Test date | Usage* | Notes | |:--------------------------------------------|:--------------------------------------------|:----------------------------------------------|:------------------------------------------------------|:------------------------------------------| | Microsoft Internet Explorer 6 | 6.0.2900.5512 | Feb 2, 2009 | 16% | | | Microsoft Internet Explorer 7 | 7.0.5730.11 | Dec 11, 2008 | 11% | | | Microsoft Internet Explorer 8 | 8.0.6001.18702 | Sep 7, 2010 | 28% | | | Mozilla Firefox 2 | 2.0.0.18 | Nov 28, 2008 | 1% | | | Mozilla Firefox 3 | 3.6.8 | Sep 7, 2010 | 22% | | | Apple Safari | 4.0 | Jun 10, 2009 | 5% | | | Opera | 9.62 | Nov 18, 2008 | 2% | | | Google Chrome | 7.0.503.0 | Sep 7, 2010 | 8% | | | Android embedded browser | SDK 1.5 R3 | Oct 3, 2009 | n/a | | * Approximate browser usage data based on public Net Applications estimates for August 2010. Disclaimers and typographical conventions Please note that although we tried to make this document as accurate as possible, some errors might have slipped through. Use this document only as an initial reference, and independently verify any characteristics you wish to depend upon. Test cases for properties featured in this document are freely available for download. The document attempts to capture the risks and security considerations present for general populace of users accessing the web with default browser settings in place. Although occasionally noted, the degree of flexibility offered through non-standard settings is by itself not a subject of this comparative study. Through the document, red color is used to bring attention to browser properties that seem particularly tricky or unexpected, and need to be carefully accounted for in server-side implementations. Whenever status quo appears to bear no significant security consequences and is well-understood, but a particular browser implementation takes additional steps to protect application developers, we use green color to denote this, likewise. Rest assured, neither of these color codes implies that a particular browser is less or more secure than its counterparts. Acknowledgments Browser Security Handbook would not be possible without the ideas and assistance from the following contributors: Filipe Almeida Brian Eaton Chris Evans Drew Hintz Nick Kralevich Marko Martin Tavis Ormandy Wladimir Palant David Ross Marius Schilder Parisa Tabriz Julien Tinnes Berend-Jan Wever Mike Wiacek The document builds on top of previous security research by Adam Barth, Collin Jackson, Amit Klein, Jesse Ruderman, and many other security experts who painstakingly dissected browser internals for the past few years.
Simple PHP Bitcoin Faucet
Assignments from the Coursera course "Bitcoin and Cryptocurrency Technologies"
Additional materials related to Bitcoin and Cryptocurrency Technologies course on Coursera, maintained by the mentors of that course.
A software framework for rapid development and deployment of Satellite based Earth Observation Services, based on the Eclipse Rich Client Platform
root de AD
Debugging extensions for Microsoft Edge and other Chromium-based browsers
A JavaScript implementation of the complete Secure Hash Standard family (SHA-1, SHA-224, SHA3-224, SHA-256, SHA3-256, SHA-384, SHA3-384, SHA-512, SHA3-512, SHAKE128, and SHAKE256) as well as HMAC
WIP: A wireshark plugin to analyze communication between lightning network nodes
Malicious traffic detection system
Home for explainer documents originated by the Microsoft Edge team
An attempt at Process Doppelgänging
Demonstrates public / private key pairs and signing in a blockchain context. This is part 2 of my Blockchain 101 video explainer.
sefu-coin-bank Secure Cryptocoin Wallet Manager Sefu Coin Bank is a secure cryptocoin wallet manager that supports the following coins: -Bitcoin -Litecoin -Namecoin
OpenSSH <=6.6 SFTP misconfiguration universal exploit
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.