personal-security-checklist VS Digital-Forensics-Guide

Compare personal-security-checklist vs Digital-Forensics-Guide and see what are their differences.

Our great sponsors
  • SurveyJS - Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
personal-security-checklist Digital-Forensics-Guide
55 6
15,680 1,343
- -
9.0 6.4
7 days ago 4 months ago
TypeScript Python
GNU General Public License v3.0 or later -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

personal-security-checklist

Posts with mentions or reviews of personal-security-checklist. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-21.

Digital-Forensics-Guide

Posts with mentions or reviews of Digital-Forensics-Guide. We have used some of these posts to build our list of alternatives and similar projects.

What are some alternatives?

When comparing personal-security-checklist and Digital-Forensics-Guide you can also consider the following projects:

awesome-cybersecurity-blueteam - :computer:πŸ›‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.

awesome-security-hardening - A collection of awesome security hardening guides, tools and other resources

Filterlist-for-AdGuard-or-PiHole - A very aggressive filter-list that consolidates over 370 lists for use in AdGuard Home, Pi-Hole or similar.

nsa-codebreaker-2020 - My solutions to the 2020 NSA Codebreaker Challenge

privacyguides.org - Protect your data against global mass surveillance programs.

privacy-respecting - Curated List of Privacy Respecting Services and Software

awesome-bugbounty-tools - A curated list of various bug bounty tools

awesome-golang-security - Awesome Golang Security resources πŸ•ΆπŸ”

pyHIDS - A HIDS (host-based intrusion detection system) for verifying the integrity of a system.

WebHashcat - Hashcat web interface

kenobi - Event Lakehouse that works with Dynamic Event Schema