Aristofanis Chionis Koufakos's repositories
Approximate_Nearest_Neighbours-LSH
University Assignment: Implement LSH algorithm for d-dimensional images in C++, using Lloyd's algorithm and Hypercube & L-Hashtables structures. L1 metric: Manhattan.
ministry-of-labor-and-social-affairs
Redesign of the webpage of the Greek ministry of Labor and social Affairs (https://www.ypakp.gr/), our solution (https://ypakp-gr.herokuapp.com/)
anmol098
If you are forking please do not forget to star the repo
awesome-cve-poc
✍️ A curated list of CVE PoCs.
awesome-web-security
🐶 A curated list of Web Security materials and resources.
conpot
ICS/SCADA honeypot
cowrie-1.5.3
Experimentation work on an old honeypot
crypto-sentiment-analyzer
A reddit scraper, that finds user sentiment in crypto markets.
dionaea
Home of the dionaea honeypot
eattheblocks
Source code for Eat The Blocks, a screencast for Ethereum Dapp Developers
email-oauth2-proxy
An IMAP/POP/SMTP proxy that transparently adds OAuth 2.0 authentication for email clients that don't support this method.
freqtrade-strategies-that-work
Crypto Trading Strategies for the freqtrade.io trading bot
iptv
Collection of publicly available IPTV channels from all over the world
kippo
Kippo - SSH Honeypot
kippo_Dockerfile
Dockerfile for the kippo honeypot
liquidator
:robot::moneybag: Bot to automatically liquidate dYdX accounts
my_first_dAPP
First try to create a decentralised App based on Ethereum.
Neural_Networks-Image_Recognition
Training and evaluation of neural network autoencoder of numeric images. Create a neural network to classify the images, using the encoder.
OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
PhilosophersPageNotebook
Explainer notebook and files for the final project of the Social Graphs & Interactions course at DTU, 2021
PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
react-ultimate-resume
💼 🎨 A modern software developer resume built with React and JSONResume
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
vault
A tool for secrets management, encryption as a service, and privileged access management