booksbyus / mkbookLinks
Hintjens' book production tools
☆46Updated 9 years ago
Alternatives and similar repositories for mkbook
Users that are interested in mkbook are comparing it to the libraries listed below
Sorting:
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- Unix architecture evolution diagrams☆82Updated 6 years ago
- Scripting with Least Privilege☆110Updated 8 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- ☆23Updated 4 months ago
- a small, lightweight pre-forking container☆21Updated 4 years ago
- Papers We ❤️ Zurich☆49Updated 6 years ago
- Control and diagnostic applications for rump kernels☆36Updated 8 years ago
- ☆20Updated 9 years ago
- A DNS server that automatically starts unikernels on demand☆22Updated 9 years ago
- Password Generation using Markov models, Huffman trees, and Charles Dickens☆43Updated 6 years ago
- An example of PEG usage☆55Updated 9 years ago
- Analyst's swiss army knife for visualizing data from ad-hoc log files☆81Updated 5 months ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 9 years ago
- BSD-licensed C99/POSIX library code shared between tarsnap, scrypt, kivaloo, spiped, and bsdiff.☆116Updated last month
- CLI to concurrently compress, decompress using Brotli algorithm☆39Updated 6 years ago
- A very fast lightweight distributed logger with a high-precision global time axis☆38Updated 10 years ago
- Bidirectional secure channels over TCP/IP☆26Updated 5 years ago
- BGP Policy Verification☆26Updated 9 years ago
- TopGit is now maintained at☆95Updated 8 years ago
- ZeroScript☆82Updated 9 years ago
- Bill McCloskey's memoize.py, grabbed with archive.org from http://www.eecs.berkeley.edu/~billm/memoize.html☆117Updated 2 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- mklove - not autoconf☆53Updated 4 years ago
- An exercise in cryptographic minimlism☆24Updated 10 years ago
- MRT Parser☆47Updated 6 years ago
- ☆89Updated 9 years ago
- experimental terminal-based heatmaps☆72Updated 10 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year