bluss / git-remote-gcryptLinks
[This fork is not maintained] git-remote-gcrypt: A git remote helper for GPG-encrypted remotes
☆146Updated 9 years ago
Alternatives and similar repositories for git-remote-gcrypt
Users that are interested in git-remote-gcrypt are comparing it to the libraries listed below
Sorting:
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 7 years ago
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆15Updated 9 years ago
- SSH configuration analysis☆74Updated 2 years ago
- Configuration to use gpg smartcards for ssh authentication☆112Updated 4 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- A ssh/gpg-agent wrapper leveraging cgroups and systemd/socket activation☆219Updated 9 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆56Updated 10 years ago
- Cross platform personalization tool for the YubiKey NEO☆57Updated 8 years ago
- Easy GnuPG key generation tool.☆62Updated 6 years ago
- A utility for deterministically generating ssh keypairs☆48Updated 3 years ago
- A magic pipe in the sky for the command line☆306Updated 12 years ago
- An Ansible role for using tor!☆72Updated 10 years ago
- PGP packet parser library☆55Updated 5 years ago
- Split SSH implementation for QubesOS☆41Updated 5 years ago
- Encrypted backups (without the backups)☆121Updated 10 years ago
- Wrapper scripts for building hardened executables by default (deprecated, replaced by standard Arch Linux toolchain changes)☆30Updated 10 years ago
- mutt-kz is DEPRECATED in favor of neomutt project.☆297Updated 3 years ago
- udev helper and rule to identify U2F tokens☆51Updated 7 years ago
- A git-annex special remote for hubiC -- UNMAINTAINED☆32Updated 8 years ago
- Small scripts and utilities, often for using other programs with Tor, routing traffic safely, removing fingerprintable system traits, and…☆175Updated 7 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 7 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- CoSi command line interface☆21Updated 8 years ago
- An evil teddy bear that steals your secrets☆39Updated 7 years ago
- Refresh your GnuPG keyring without disclosing your whole contact list to the world☆229Updated 2 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆208Updated last year
- uclibc build environment for predictable and repeatable building of binary packages☆56Updated 8 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- The "State considered harmful" paper☆107Updated 9 years ago