davidlazar / rigLinks
random identity generator
☆15Updated 8 years ago
Alternatives and similar repositories for rig
Users that are interested in rig are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- System administration tool for automatic configuration testing☆15Updated last year
- My Privoxy configuration files☆27Updated 13 years ago
- Hash-based password manager☆19Updated 6 years ago
- awesome-unikernels☆15Updated 10 years ago
- This is a list of scripts I created while formerly working at Drexel University. These scripts were released with permission.☆16Updated 5 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 8 years ago
- BSM based intrusion detection system☆40Updated 2 months ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Updated 8 years ago
- Tool for generating optimized firewall rules☆44Updated 2 years ago
- System administration tools☆61Updated 4 months ago
- ☆22Updated 6 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 4 years ago
- Hackerfleet Operating System☆29Updated 6 years ago
- ☆122Updated 5 years ago
- Subgraph OS Handbook☆123Updated 8 years ago
- Repository for various tools around security☆41Updated last year
- Enterprise Linux Exploit Mapper☆28Updated 8 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- Easy creation of Tor Hidden Services☆39Updated 10 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- a collection of stickers and, where possible, their source files to help others make new cryptoparty flyers☆18Updated 7 years ago
- asciicast2gif converts asciicast files to animated GIF files☆39Updated 8 years ago
- manage a repository of 0install feeds☆18Updated last year
- ☆21Updated 13 years ago
- huawei mac2wepkey scanner☆19Updated 12 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆33Updated 7 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆64Updated 3 years ago
- Hourglass cryptographically locks your files so they can only be read after a certain amount of time.☆25Updated 9 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago