School Of Freelancing's Projects
Connect main repository
Gain Technological Benefit Of Your Business Competitor
Novel Coronavirus (COVID-19) Cases, provided by JHU CSSE
COVID-19 Confirmed cases map over time
Free & Open Source Invoice App for Freelancers & Small Businesses
Set up a modern web app by running one command.
Crypto Bazzar is a complete digital assets exchange platform for connected to the blockchain
Cryptocurrency price indicator for Ubuntu!
Liquidity Making Bot for CryptoCurrency Exchanges
Cryptocurrency trading bot in javascript for Bitfinex, Bitmex, Binance ... (public edition)
Fast, easy and reliable testing for anything that runs in a browser.
Docker images with Cypress dependencies and browsers
Data Science Book Collections
Fork of DDoS Deflate with fixes, improvements and new features.
DDoS Tool using Multi-tor and Torshammer tool
The participatory democracy framework. A generator and multiple gems made with Ruby on Rails.
Rails app providing API to send audio for captioning using DeepSpeech
Website that allows users to directly ask attorneys legal questions and locate Law Firms based on legal needs. (Back-end)
A simple API to send SMS messages. It is modeled after the django email api.
Deep learning with TensorFlow, Keras
Docker application designed to help child protection workers and social workers in humanitarian and development contexts manage data on vulnerable children and survivors of violence
Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning
Projects as exercises for Docker training
Projects as exercises for Docker training
HackerOne Platform Documentation
MxsDoc is a web based document management system
Repository for documentation process for RestComm projects
Dropbear SSH
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.