Projets open-source tagués neovim sur GitHub
🔗 Visiter GitHub Topics: neovimDescription
Projets open-source tagués neovim sur GitHub
💬 Notre avis
Ce site est une section de GitHub qui regroupe des projets open-source liés à Neovim. Si tu cherches à explorer des outils, des plugins ou des configurations qui améliorent Neovim, tu es au bon endroit. Tu trouveras une variété de projets, allant des simples scripts aux configurations complètes. Cependant, il faut savoir que la qualité des projets peut varier énormément, certains étant très aboutis et d'autres moins. Tu pourrais aussi tomber sur des projets peu maintenus, donc fais attention à la date de dernière mise à jour. C'est un bon point de départ pour les développeurs qui veulent plonger dans l'univers de Neovim, mais n'hésite pas à comparer avec d'autres ressources comme VimAwesome ou Awesome Neovim pour obtenir des recommandations plus fiables. En termes de prix, tout est gratuit ici, mais assure-toi de respecter les licences des projets que tu souhaites utiliser ou modifier. La plateforme est en anglais, donc si tu ne maîtrises pas la langue, ça peut être un frein. En résumé, c'est un bon outil pour les passionnés de Neovim, mais sois vigilant dans tes choix de projets. <!-- ai-reviewed -->
💰 Prix
🤖 Fiche enrichie
Points positifs
Accès à une large variété de projets
Communauté active
Gratuit
Points négatifs
Qualité inégale des projets
Interface en anglais
🔄 Alternatives à GitHub Topics: neovim
Voir toutes les alternatives à GitHub Topics: neovim →🔗 Sites similaires
neovim (GitHub)
Dépôt GitHub: neovim par neovim
r/neovim
Communauté Reddit: neovim
AutoShun
AutoShun is a Snort plugin that allows you to send your Snort IDS logs to a centralized server that will correlate attacks from your sensor logs with other snort sensors, honeypots, and mail filters from around the world.
DNS-BH
The DNS-BH project creates and maintains a listing of domains that are known to be used to propagate malware and spyware. This project creates the Bind and Windows zone files required to serve fake replies to localhost for any requests to these, thus preventing many spyware installs and reporting.
Tor Bulk Exit List
CollecTor, your friendly data-collecting service in the Tor network. CollecTor fetches data from various nodes and services in the public Tor network and makes it available to the world. If you're doing research on the Tor network, or if you're developing an application that uses Tor network data, this is your place to start. [TOR Node List](https://www.dan.me.uk/tornodes) / [DNS Blacklists](https://www.dan.me.uk/dnsbl) / [Tor Node List](http://torstatus.blutmagie.de/)
TOR Node List
TOR Node List
Project Honey Pot
Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.
MISP - Open Source Threat Intelligence Platform
MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators. A threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information. The MISP project includes software, common libraries ([taxonomies](https://www.misp-project.org/t
Gophish
An Open-Source Phishing Framework.
Portswigger
PortSwigger offers tools for web application security, testing & scanning. Choose from a wide range of security tools & identify the very latest vulnerabilities.
ModSecurity
ModSecurity is a toolkit for real-time web application monitoring, logging, and access control.
sqlmap
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
💬 Commentaires
Aucun commentaire pour le moment. Soyez le premier ! 🎯