-
@inlyse GmbH
- Nuremberg, Germany / León, México
-
20:19
(UTC -06:00) - https://jloehel.github.io/
- https://orcid.org/0009-0009-2906-8790
- https://keybase.io/jloehel
- in/jloehel
- https://build.opensuse.org/project/show/home:jloehel
Highlights
- Pro
Lists (9)
Sort Name ascending (A-Z)
- All languages
- Adblock Filter List
- Assembly
- Batchfile
- Bicep
- BitBake
- C
- C#
- C++
- CMake
- CSS
- D
- DIGITAL Command Language
- Dockerfile
- Emacs Lisp
- Fortran
- GDScript
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Just
- Kotlin
- Lua
- MATLAB
- Makefile
- Markdown
- Max
- Nim
- Nix
- OCaml
- PHP
- Pascal
- Perl
- PostScript
- PowerShell
- Python
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Swift
- TeX
- Text
- TypeScript
- Vim Script
- Vue
- XSLT
- YARA
- Zeek
Starred repositories
Ghidra is a software reverse engineering (SRE) framework
Generate diagrams from textual description
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Allows you to emulate an Android native library, and an experimental iOS emulation
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
The Apache Tika toolkit detects and extracts metadata and text from over a thousand different file types (such as PPT, XLS, and PDF).
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to invest…
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation b…
TrackerControl Android: monitor and control trackers and ads.
Scalable, reliable, distributed storage system optimized for data analytics and object store workloads.
A library to read PST files with java, without need for external libraries.
A Friend-to-Friend, decentralized and secure application for communication and sharing
Simulate realistic trajectory data seen through sporadic reporting
Examples of SPDX files for software combinations
Produce an Open Source Vulnerability JSON file based on information in an SPDX document
Java library for working with available vulnerability data sources (GitHub Security Advisories, NVD, EPSS, CISA Known Exploited Vulnerabilities, etc.)
Proof of concept for OWASP Dependency-Track's own, centralized vulnerability database.
A Jenkins plugin to create listings of third-party components and their licenses
SPDX Java library spreadsheet storage