An open API service indexing awesome lists of open source software.

Projects in Awesome Lists by 1-5Pool

A curated list of projects in awesome lists by 1-5Pool .

https://github.com/1-5pool/iitkanpur_hackathon

IIT Kanpur in collaboration with HCL organized a Cybersecurity hackathon in which the participants had to create a working solution of cyber security problems.

cybersecurity ddos-detection hackathon iitk machine-learning malware-detection

Last synced: 13 May 2025

https://github.com/1-5pool/ransomwareeschrowservice

DeRMiP (Decentralized Ransomware Proof-of-Life) is an Ethereum-based smart contract implementation that facilitates a secure escrow service for ransomware negotiations. This project demonstrates the concept of using blockchain technology and cryptographic techniques to establish a trustless environment for victims to register, and more

decentralized-applications escrow-service ethereum nodejs python ransomware smart-contracts solidity

Last synced: 12 Mar 2025

https://github.com/1-5pool/nmap-to-cherrytree

Converts autorecon results (nmap.xml) to cherrytree .ctd format

Last synced: 12 Mar 2025

https://github.com/1-5pool/spc_ctf

Last synced: 12 Mar 2025

https://github.com/1-5pool/pentestingnotes

These are my old notes which include methodology and even the commands to do manual pretesting/red teaming assessment.

Last synced: 12 Mar 2025

https://github.com/1-5pool/spc_ctf123

Last synced: 12 Mar 2025

https://github.com/1-5pool/test

Last synced: 12 Mar 2025

https://github.com/1-5pool/ctf

Last synced: 12 Mar 2025

https://github.com/1-5pool/testing

Last synced: 12 Mar 2025

https://github.com/1-5pool/python_pentesting

All The Usefull Tool That Can Be Made Using Python For A Pentester.

Last synced: 12 Mar 2025

https://github.com/1-5pool/jmessage-security-project

JMessage: Encrypted Messaging System with Security Analysis This project implements an end-to-end encrypted messaging system using ECDH, ChaCha20, and ECDSA. It also demonstrates a padding oracle attack, showcasing both secure system design and vulnerability exploitation techniques.

chat-application cryptography end-to-end-encryption golang padding-oracle-attacks

Last synced: 07 Apr 2025