root
Metasploit
root | Metasploit | |
---|---|---|
31 | 117 | |
2,430 | 32,924 | |
1.5% | 1.0% | |
10.0 | 10.0 | |
2 days ago | 6 days ago | |
C++ | Ruby | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
root
-
If you can't reproduce the model then it's not open-source
I think the process of data acquisition isn't so clear-cut. Take CERN as an example: they release loads of data from various experiments under the CC0 license [1]. This isn't just a few small datasets for classroom use; we're talking big-league data, like the entire first run data from LHCb [2].
On their portal, they don't just dump the data and leave you to it. They've got guides on analysis and the necessary tools (mostly open source stuff like ROOT [3] and even VMs). This means anyone can dive in. You could potentially discover something new or build on existing experiment analyses. This setup, with open data and tools, ticks the boxes for reproducibility. But does it mean people need to recreate the data themselves?
Ideally, yeah, but realistically, while you could theoretically rebuild the LHC (since most technical details are public), it would take an army of skilled people, billions of dollars, and years to do it.
This contrasts with open source models, where you can retrain models using data to get the weights. But getting hold of the data and the cost to reproduce the weights is usually prohibitive. I get that CERN's approach might seem to counter this, but remember, they're not releasing raw data (which is mostly noise), but a more refined version. Try downloading several petabytes of raw data if not; good luck with that. But for training something like a LLM, you might need the whole dataset, which in many cases have its own problems with copyrights…etc.
[1] https://opendata.cern.ch/docs/terms-of-use
[2] https://opendata.cern.ch/docs/lhcb-releases-entire-run1-data...
[3] https://root.cern/
- What software is used to generate plots/graphs like this seen in many particle physics papers?
-
Interactive GCC (igcc) is a read-eval-print loop (REPL) for C/C++
The odd part is that this is not just for fun. For many physicists when I was at CERN, a C++ REPL was a commonly used tool to interactively debug analyses to such a degree that many never compiled their code. Back then, I believe, it was some custom implementation included in ROOT (https://root.cern/). I even went out of my way to write C++ code compatible to it just so it could run with this implementation, otherwise some colleagues weren't interested in collaborating at all.
-
Stable Diffusion in pure C/C++
That Python ML code is calling C++ code running in the GPU, one more reason to use C++ across the whole stack.
CERN already used prototyping in C++, with ROOT and CINT, 20 years ago.
https://root.cern/
Nowadays it is even usable from Netbooks via Xeus.
It is more a matter of lack of exposure to C++ interpreters than anything else.
- Root: Analyzing Petabytes of Data, Scientifically
-
Aliens might be waiting for humans to solve a puzzle
Quantum computing is a pretty interesting science too. https://home.cern/news/press-release/knowledge-sharing/cern-quantum-technology-initiative-unveils-strategic-roadmap they have to deal with lots of data streaming too https://root.cern/
-
cppyy Generated Wrappers and Type Annotations
I'm a user of CERN's ROOT (https://root.cern/) and while I'd usually write in C++, I've been trying to write as much Python as I can recently to get a bit better in the language.
- Root: Analyzing Petabytes of Scientific Data
-
Span: how to cast pointer of pointer to other types?
I'm dealing with a C++ software called ROOT made by CERN, which is, if I'm not wrong, the only C++ API that we could use for data analysis such as plotting histograms, fitting multi-parameter functions and storing data in the size of TB to the disk and many more. That's the only reason why physicists still stick to this software. you can check here .
-
How exactly would you go about writing a program to simplify algebraic expressions?
Hey, I found something which could be useful: https://root.cern
Metasploit
-
Best Hacking Tools for Beginners 2024
Metasploit
- Metasploit: Add Systemd BSOD QR Payload?
- Metasploit explained for pentesters
-
Effective Adversary Emulation
Metasploit: https://github.com/rapid7/metasploit-framework
- CVE-2023-22515 - Atlassian Confluence unauthenticated RCE exploit module
-
Hacking from anywhere
1-) Learn Hacking on a debian based distro like Kali Linux - I personally started with tools like nikto, camhacker... and then moved to more complex frameworks like metasploit.
-
CMV: The Second Amendment "right to bear arms" and the discussions surrounding gun control also apply to hacking tools.
I once had to give a presentation about Metasploit, and whether it was ethically correct for the creator to make it free and open-source, available to everyone. And in researching this I realized that there were a lot of parallels between the arguments for or against hacking tools being readily available and the arguments for or against gun control. I'll just list a few quickly:
-
Hackers Tools: Must-Have Tools for Every Ethical Hacker
Metasploit Framework (mentioned earlier)
-
Penetration Testing
This phase is where the pen testers practically prove that there exist potential vulnerabilities in the target system. The pen testers do the hacking using an array of technical approaches and social engineering methods to exploit the vulnerabilities. The ethical hackers commonly use Metasploit framework to automatically execute exploitation against the target systems. Moreover, they may install malwares such as rootkit to persistently maintain their foothold and further compromise the target system.
- Metasploit Framework
What are some alternatives?
PyMesh - Geometry Processing Library for Python
BeEF - The Browser Exploitation Framework Project
xeus - Implementation of the Jupyter kernel protocol in C++
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
tfgo - Tensorflow + Go, the gopher way
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
windows-telemetry-blocklist - Blocks outgoing Windows telemetry, compatible with Pi-Hole.
SQLMap - Automatic SQL injection and database takeover tool
decimal - Arbitrary-precision fixed-point decimal numbers in Go
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
apd - Arbitrary-precision decimals for Go
Brakeman - A static analysis security vulnerability scanner for Ruby on Rails applications