☆11Oct 8, 2022Updated 3 years ago
Alternatives and similar repositories for Celsius
Users that are interested in Celsius are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Apr 18, 2022Updated 3 years ago
- Exploiting CVE-2014-3153, AKA Towelroot.☆13Jan 16, 2021Updated 5 years ago
- IdentityNow Management custom connector☆13Aug 18, 2025Updated 7 months ago
- Terraform provider for IdentityNow cloud-based access management product☆14Dec 13, 2024Updated last year
- Creates a TCC profile for new Privacy Payloads in macOS Mojave☆20Sep 28, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆14Nov 10, 2019Updated 6 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- A workshop for operating OpenShift 4 in a disconnected environment☆14Apr 2, 2026Updated last week
- A wildfire map built with Protomaps and MapLibre☆14Nov 18, 2024Updated last year
- Red Hat OpenShift Container Storage (RHOCS) backup scripts.☆11Jun 27, 2019Updated 6 years ago
- RPM with PAM for Centos 7 with a port of update-motd from Ubuntu☆15Mar 27, 2022Updated 4 years ago
- clone of puppetlabs/puppetdb☆23Updated this week
- 🐍 Permissionless derivatives☆45May 19, 2023Updated 2 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- dead simple reverse proxy and webserver☆12Updated this week
- A Vim9.1 plugin for managing three-way merges; pure vim9script.☆14Aug 28, 2024Updated last year
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆30Updated this week
- Wireshark sources, with additional sources for a plugin to read thrift messages☆14Jan 24, 2014Updated 12 years ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- This Repo houses code to control the Uplift Sit-to-Stand Desk from Staples with the jcp35n-blt Bluetooth adapter.☆12May 24, 2022Updated 3 years ago
- This repo is a fix to allow you to load the Pushbullet Chrome Extension unpacked and have it work again.☆27Dec 6, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A domain name typo finder to determine typos of a domain name.☆15Mar 18, 2013Updated 13 years ago
- Hashpic creates an image from a MD5, SHA512, SHA3-512, Blake2b or SHAKE256 hash☆26Feb 11, 2026Updated 2 months ago
- Prisma to Ent schema conversion script☆10Mar 28, 2022Updated 4 years ago
- Python SDK and CLI utility for searchcode.com.☆10Updated this week
- A bash wrapper to help you connect to your instances☆15May 20, 2016Updated 9 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- Code for implementing MIDI over BLE using an Arduino 101☆17Dec 2, 2016Updated 9 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- WIP: Opinionated catalogue of operators designed for OKD☆26Feb 12, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆17Mar 22, 2018Updated 8 years ago
- Java Random sequence crackers materials☆13May 25, 2014Updated 11 years ago
- ☆16Apr 4, 2026Updated last week
- A DMARC deployment/monitoring tool written in python.☆16Aug 17, 2016Updated 9 years ago
- BlueRepli-Plus☆18Jul 17, 2020Updated 5 years ago
- 1st phase of mifare classic nested auth key recovery☆16Dec 19, 2019Updated 6 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 10 years ago