booksbyus / mkbookLinks
Hintjens' book production tools
☆46Updated 8 years ago
Alternatives and similar repositories for mkbook
Users that are interested in mkbook are comparing it to the libraries listed below
Sorting:
- ☆20Updated 9 years ago
- ☆22Updated 2 months ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- Block median value perceptual hash RFC for URN namespace☆27Updated 5 years ago
- CLI to concurrently compress, decompress using Brotli algorithm☆39Updated 5 years ago
- Unix architecture evolution diagrams☆82Updated 6 years ago
- Data structure traversal in the command line☆9Updated 5 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- salty privacy☆52Updated 4 years ago
- Stackbuilder builds stacks of virtual machines☆21Updated 8 months ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- ZeroVM Run-Time environment☆65Updated 10 years ago
- Control and diagnostic applications for rump kernels☆36Updated 8 years ago
- Papers We ❤️ Zurich☆49Updated 6 years ago
- ZeroScript☆82Updated 9 years ago
- A DNS server that automatically starts unikernels on demand☆22Updated 9 years ago
- A small tool to do the statistics legwork on benchmarks etc.☆75Updated 9 years ago
- An exercise in cryptographic minimlism☆24Updated 10 years ago
- coming soon☆13Updated 3 years ago
- Superfast Line Counter☆50Updated 4 years ago
- Crema: A Sub-Turing Programming Language☆66Updated 9 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Unprotocols RFC☆46Updated 8 years ago
- Use some TLS servers for trusted timestamping☆42Updated 9 years ago
- Scripting with Least Privilege☆109Updated 8 years ago
- Slides and resources for talks on partition tolerance☆33Updated 7 years ago
- The Hydra Protocol☆55Updated 10 years ago
- simple charting tools for unix.☆28Updated 9 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Updated 5 years ago