benjojo / dubstep-data
Put data inside dubstep drops
☆280Updated 6 years ago
Alternatives and similar repositories for dubstep-data:
Users that are interested in dubstep-data are comparing it to the libraries listed below
- a peculiar chat app for strange times☆133Updated 6 years ago
- rot13 for the Unicode generation☆127Updated 2 years ago
- find all your mutuals and throw them on a list so you can all be miserable together on twitter dot com☆136Updated 3 years ago
- ☆97Updated 7 years ago
- ☆97Updated 7 years ago
- Live htop 📺☆208Updated 5 years ago
- Code to drive the receipt printer in the Cloudflare London office that outputs randomness☆94Updated 7 months ago
- A Twitter bot which tweets Magic: the Gathering cards with appropriate GIFs superimposed onto them.☆213Updated 7 years ago
- Making art with SSH key randomart☆137Updated 6 years ago
- ssh register@ui.baxx.dev [shutdown due to covid-19]☆136Updated 5 years ago
- Flappy Bird implemented on the HP7440A pen plotter☆176Updated 5 years ago
- How to rickroll Spotify for Android☆530Updated 8 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- an embeddable dumb heartbeat daemon in 260 bytes of RAM and ≈350 bytes of code☆271Updated 7 years ago
- The complete opposite of a font☆234Updated 7 years ago
- An implementation of rule 110 in Scalable Vector Graphics☆147Updated 4 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- Markov Chain Twitter Bot generator☆116Updated 2 years ago
- 855-MEOW-JAM☆70Updated 6 years ago
- My blogging system ( Reinventing the wheel like every dev wants to do )☆74Updated 4 months ago
- A UNIX Command To Anonymise Data☆351Updated 6 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- Bootable PDF CV☆227Updated 4 years ago
- An asemic Markov-chained cipher☆203Updated 4 years ago
- See if your passwords in pass has been breached.☆132Updated 6 years ago
- The Swiss army knife of data examination and manipulation☆333Updated 6 years ago
- Etherify - bringing the ether back to ethernet☆343Updated 3 years ago
- Thoughts on resolution independence☆145Updated 12 years ago
- Generate guitar tablatures using a constraint solver☆138Updated 5 years ago
- Generate minimaps of your code☆171Updated 7 years ago