barn / curlbrash
Put an end to curl | bash with this one weird trick
☆14Updated 9 years ago
Alternatives and similar repositories for curlbrash:
Users that are interested in curlbrash are comparing it to the libraries listed below
- encrypt and decrypt small files using OpenSSH keys☆70Updated 11 years ago
- Website privacy checker☆27Updated 8 years ago
- TLS labs☆30Updated 4 years ago
- ☆30Updated 9 years ago
- DNSSEC/TLS tools☆35Updated 11 years ago
- ⛔ DEPRECATED☆34Updated 5 years ago
- A Python implementation of JOSE☆14Updated 5 years ago
- simple lightweight Linux cron daemon☆10Updated 8 years ago
- Certbot plugin that uses an external shell script for domain validation☆50Updated 7 years ago
- DNSSEC Trust Anchor tools☆10Updated 8 years ago
- uclibc build environment for predictable and repeatable building of binary packages☆56Updated 7 years ago
- a tool to facilitate sharing of secrets using SSH keys☆226Updated 2 years ago
- THIS REPOSITORY IS AN ARCHIVE - SEE☆9Updated 9 years ago
- TLS Report☆25Updated 4 years ago
- Script to make RSA authentication key generation on Yubikeys differently painful☆28Updated 9 years ago
- SSH configuration analysis☆75Updated last year
- Kickstart installation utilities for RHEL/CentOS☆8Updated 7 years ago
- A lightweight, self-hosted and API-based file upload server supporting YubiKey OTP authentication.☆23Updated 4 years ago
- WikiMo documentation (mainly the security space, but everyone's welcome to use this)☆65Updated last year
- Berth use Docker containers to build packages for you, based on a YAML configuration file.☆11Updated 7 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 6 years ago
- video onion hackery (osx scripts)☆20Updated 8 years ago
- Open Secret Server☆28Updated 2 years ago
- experimental terminal-based heatmaps☆70Updated 9 years ago
- A set of ansible playbooks to create an OpenVPN server at DigitalOcean☆16Updated 8 years ago
- A dead simple secret store service for anyone using AWS☆37Updated 5 years ago
- Tooling for verifying that everyone in your orgs has 2fa enabled.☆32Updated 8 months ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- ☆123Updated 4 years ago