Pinned Repositories
ibis
the portable Python dataframe library
atlas
OSM in memory
smart_open
Utils for streaming large files (S3, HDFS, gzip, bz2...)
atlas
OSM in memory
atlas-checks
OSM data integrity checks with Atlas
groovy
Mirror of Apache Groovy
ibis
The flexibility of Python with the scale and performance of modern SQL.
mongodb-sharded-replSet-GridFS
Scripts to create a MongoDB Sharded Replica Set (for GridFS)
PrinterDOSAttackScripts
This repository contains very basic Linux shell scripts to attack a network printer. Note that this is a purely academic exercise and should not under any circumstances be used to attack a system you do not own. If you do so, you are solely responsible for this activity and not the author of this tool. The goal is to understand and hence protect network computing assets like Printers, Scanners, Copiers and Faxes which are increasingly becoming more complex and powerful computing devices that can do a lot more than what they were originally intended for.
securityReportGenerationAutomation
This project contains Jasper Report files confirming to a specific CSV input as the datasource containing security findings and autoimatically generates, executive summary report and a report of detailed findings.
yazad3's Repositories
yazad3/mongodb-sharded-replSet-GridFS
Scripts to create a MongoDB Sharded Replica Set (for GridFS)
yazad3/atlas
OSM in memory
yazad3/atlas-checks
OSM data integrity checks with Atlas
yazad3/groovy
Mirror of Apache Groovy
yazad3/ibis
The flexibility of Python with the scale and performance of modern SQL.
yazad3/PrinterDOSAttackScripts
This repository contains very basic Linux shell scripts to attack a network printer. Note that this is a purely academic exercise and should not under any circumstances be used to attack a system you do not own. If you do so, you are solely responsible for this activity and not the author of this tool. The goal is to understand and hence protect network computing assets like Printers, Scanners, Copiers and Faxes which are increasingly becoming more complex and powerful computing devices that can do a lot more than what they were originally intended for.
yazad3/securityReportGenerationAutomation
This project contains Jasper Report files confirming to a specific CSV input as the datasource containing security findings and autoimatically generates, executive summary report and a report of detailed findings.