davidlazar / rigLinks
random identity generator
☆15Updated 8 years ago
Alternatives and similar repositories for rig
Users that are interested in rig are comparing it to the libraries listed below
Sorting:
- Creates a PDF report out of PCP archive files collected via pmlogger☆11Updated 3 years ago
- The Anvil! Intelligent Availability™ Platform - Striker UI and ScanCore decision engine☆27Updated 3 years ago
- System administration tool for automatic configuration testing☆15Updated last year
- A guided tour of docker basics☆24Updated 7 years ago
- Technical reports and preprints☆14Updated 8 years ago
- Advanced FireWall cookbook for Chef and Linux that uses Iptables and to dynamically configure inbound and outbound rules on each node.☆40Updated 10 years ago
- My Privoxy configuration files☆27Updated 13 years ago
- i3 configuration files for ArchStrike☆9Updated 6 years ago
- Subgraph OS Handbook☆122Updated 7 years ago
- A script to (nearly) fully automate the process of building Centos7 Amazon Machine Images (AMIs)☆19Updated 9 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 7 years ago
- a collection of stickers and, where possible, their source files to help others make new cryptoparty flyers☆18Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Updated 6 years ago
- A text-based business simulation game written in Bash where players run a coffee shop.☆14Updated 5 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- Tools to make CI Packer builds awesome☆23Updated last year
- Hash-based password manager☆19Updated 6 years ago
- awesome-unikernels☆15Updated 10 years ago
- ☆15Updated 8 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Bash profiler☆26Updated 11 years ago
- SSH load testing tool.☆14Updated 3 years ago
- An open source encryption program that uses the "one-time pad" method.☆33Updated 4 years ago
- ☆122Updated 5 years ago
- An embedded wireless security audit system☆21Updated 12 years ago
- ☆7Updated 4 years ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- ☆44Updated 9 years ago
- Like logcheck, but for journald☆11Updated 8 years ago