Curtail is a utility program that reads stdin and writes to a file bound by size.
☆38Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for Infinite-File-Curtailer
Users that are interested in Infinite-File-Curtailer are comparing it to the libraries listed below
Sorting:
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- Simple TR64 UPnP: A simple way to talk to your UPnP and/or TR64 protocol devices☆11Mar 13, 2021Updated 4 years ago
- A tool for inspecting the contents of Apache Traffic Server caches☆14Sep 26, 2019Updated 6 years ago
- For use in our Tenable.IO to AWS Security Hub integration☆28Sep 4, 2025Updated 5 months ago
- A selenium bot for doing the voice surveys at McDonalds☆11Jan 21, 2022Updated 4 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- 안드로이드 오픈 라이브러리 Android Library : Everything, including this library☆31Apr 3, 2014Updated 11 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- Grunt plugin for retire.☆89Jul 20, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago
- Utility to run separate X with discrete nvidia graphics with full performance adapted to work on Debian 9. in a Lenovo Yoga☆11Dec 20, 2018Updated 7 years ago
- Gestro revolutionises the way of controlling one’s PC in real-time with the use of hand gestures, made possible using Computer Vision app…☆13Apr 21, 2022Updated 3 years ago
- Bot software for creating Wikipedia articles using geographical data☆10Feb 28, 2017Updated 9 years ago
- another crux ports repo☆11Updated this week
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- Open-source Human Feedback Library☆11Oct 25, 2023Updated 2 years ago
- Unofficial Linux client for the Blokada-VPN-service☆10Aug 26, 2022Updated 3 years ago
- A Terraform repository to setup a SurrealDB GKE cluster on GCP☆10Feb 3, 2025Updated last year
- Vue component to easy select time intervals. Available at npm. 2018☆15Mar 1, 2019Updated 7 years ago
- A webscraper example in golang that scrapes list of projects from your Gitlab account.☆11Aug 22, 2018Updated 7 years ago
- Scrape-Off Layer Plasma Simulation code☆31Updated this week
- A slimmed down gentoo linux livecd/liveusb iso that allows to load different boot options and runs from RAM upon boot. A VCTLabs project.☆11Feb 18, 2020Updated 6 years ago
- Firefox extension☆21May 16, 2014Updated 11 years ago
- Build scripts to compile Resurrection Remix ROM☆13Mar 18, 2017Updated 8 years ago
- Scripts utilitários para mazonOS☆10Apr 4, 2019Updated 6 years ago
- A File Hash Calculator for Win32, Win64 and OS X Written with Delphi XE7☆15Mar 9, 2015Updated 10 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- This is a postfix content filter written in BASH scripting language which automatically encrypt email messages with email encryption stan…☆10Nov 8, 2021Updated 4 years ago
- a PhoneGap/Cordova plugin for OpenEars:☆10Apr 27, 2015Updated 10 years ago
- Faster manipulation of dendrogram objects in R.☆15May 22, 2015Updated 10 years ago
- Tamper resistant, off-site audit logging for WordPress☆14Jan 14, 2026Updated last month
- Repository for service oriented architecture code and components.☆18Aug 28, 2017Updated 8 years ago
- The well-known pager, with performance improvements for huge files☆13Sep 23, 2014Updated 11 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- A library to allow multiple applications to share a single SQLite database☆12Oct 16, 2019Updated 6 years ago
- A distributed network based on hash codes and lattices.☆14Aug 16, 2016Updated 9 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago