benjojo / hot-clone
Progressively image a mounted disk correctly without corruption
☆309Updated 3 years ago
Alternatives and similar repositories for hot-clone:
Users that are interested in hot-clone are comparing it to the libraries listed below
- 🦠 NVMe-TCP at your fingertips 🦠☆307Updated 2 months ago
- Test ssh login key acceptance without having the private key☆218Updated 3 years ago
- Zero config TLS proxy server that uses SNI☆143Updated last year
- PKI support for SSH certificates☆57Updated 3 years ago
- iptables target that uwu's outgoing packets☆88Updated 4 years ago
- ☆66Updated 4 years ago
- Split ping, see what direction the loss or latency is on☆317Updated last year
- A netcat/ncat like tool that bonds multiple sockets together.☆240Updated last year
- Make a disk image formatted with both ext2 and FAT at once☆383Updated last year
- Turn IP sockets into Unix domain sockets☆365Updated 9 months ago
- ssh-agent for TPMs☆439Updated 3 weeks ago
- Command consrv is a SSH to serial console bridge server, originally designed for deployment on gokrazy.org devices. Apache 2.0 Licensed.☆138Updated 4 months ago
- A simple LD_PRELOAD library to disable SSL certificate verification. Inspired by libeatmydata.☆179Updated 6 years ago
- Mirror only. Official repository at https://git.glasklar.is/system-transparency/core/system-transparency☆86Updated last month
- Tools for using PIV tokens (like Yubikeys) as an SSH agent, for encrypting data at rest, and more☆200Updated last week
- ☆579Updated 9 months ago
- a virtual black hole file system that behaves like /dev/null☆296Updated 2 weeks ago
- Fast backups for logical volumes & disk images☆256Updated 2 weeks ago
- Paused mirror. Official repository at https://git.glasklar.is/system-transparency/core/stboot☆111Updated last year
- Imagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...☆418Updated 3 years ago
- A WebAuthn/U2F token protected by a TPM (Go/Linux)☆328Updated 11 months ago
- generate Wireguard keypairs with a given prefix string☆449Updated 8 months ago
- Attest the trustworthiness of a device against a human using time-based one-time passwords☆173Updated 10 months ago
- The NetAuth service itself.☆72Updated 7 months ago
- Silly usage of AWS EC2 IPv6 prefixes☆321Updated 3 years ago
- TLS key escrow/interception for debugging☆254Updated 11 months ago
- Incremental backup with strong cryptographic confidentiality baked into the data model.☆130Updated last year
- A dedicated Chrome instance to log into captive portals without messing with DNS settings.☆452Updated 2 years ago
- Modern network boot server.☆224Updated 2 months ago
- shim library to automatically change AF_INET sockets to AF_UNIX, etc.☆41Updated 2 years ago