Project Skyscraper - PoC of a Cloud Governance Dashboard

a project by tmuntan1

Project Description

We would like to create a single interface for teams to manage our cloud governance.

Updated almost 2 years ago. 1 hackers ♥️. 2 followers.

Video For Linux 2 Camera monitor, frame capture, day/night exposure control and timelapse generator in python

a project by dmair

Use the V4L2 API in a PySide qt6.3 application to capture frames, monitor and adjust image exposure from a camera Frame capture is functional

Updated almost 2 years ago. 1 hackers ♥️. 1 follower.

TeX macros for a puzzle game

a project by mcalabkova

Motivation

There is plenty of puzzle games (see Šifrovačky.cz), but currently none designed for children. With my husband we are thinking of starting/reviving one and creation of a fine typesetting system is one of the preliminary steps. The macros could also be used by other puzzle games in need of a new typesetting system (I could publish them if I liked my work).

Updated almost 2 years ago. 1 hackers ♥️. 2 followers.

reformatting text in vis

an invention by mcepl

Project Description

There is this text editor vis, modal text editor based on the Plan9 structural regular expressions and se(1). However, comparing to sam(1) or acme(1) it feels mostly like advanced vi(m) not something completely new (and it is not mouse-driven).

Updated over 1 year ago. 1 hackers ♥️. 1 follower.

Show Me The Key: A screenkey alternative that works under Wayland via libinput

a project by AZhou

(Improve last hackweek's project.) <https://showmethekey.alynx.one/>

Updated almost 2 years ago. 1 hackers ♥️. 2 followers.

Securing and improving home/server network

a project by ohollmann

Project Description

Now, when mikrotik supports WireGuard there is no need to stay with OpenVPN. Let's try to setup WireGuard and investigate it's options, test performance etc.

Updated almost 2 years ago. 1 hackers ♥️. 3 followers.

Write a formula with forms for setting up a container registry

a project by mcalmer

Project Description

Learn about formulars with forms and write a formula which setup a container registry.

Updated almost 2 years ago. 1 hackers ♥️. 1 follower.

Audio steganography for music digital signatures

an idea by shawnhao

Project Description

There are lots of indie musicians who are not very aware of protecting their copyright and it is hard to determine plagiarism in music. I believe a digital signature could be useful to present copyright on court without damaging and altering the soundings of a song. But I am also aware that a signature alone may not be sufficient to protect copyrights and it is able to bypass it.

Updated almost 2 years ago. 1 hackers ♥️. 1 follower. Has no hacker: grab it!

Learn more about Application Security (AppSec) Open Source Tools and Testing Techniques

an idea by heidi.bronson

Project Description

Application security (AppSec) is a threat that all organizations are facing. While we have QA engineers and security teams to help avoid these threats, true AppSec can only be obtained by giving developers the tools to find and fix vulnerabilities before their code is pushed into the deployment pipeline. As a software engineer, I want to make sure that my applications are secure. During this hackweek, I want to study the OWASP Top 10 vulnerabilities, related testing techniques, and open source tools that can be used to test our applications and keep them safe from malicious actors.

Updated almost 2 years ago. 1 hackers ♥️. 1 follower. Has no hacker: grab it!

Poking technologies for enrolling customer key to kernel trusted keyring

a project by joeyli

Project Description

The keys in db or mok can be used to verify boot loader and kernel binary for booting. But upstream kernel doesn't trust them for enrolling to trusted keyring because they are enrolled outside the boundaries of kernel. Which means that IMA can not use db/mok keys for verification.

Updated almost 2 years ago. 1 hackers ♥️. 1 follower.