geon / shebang-abuse
☆143Updated 8 years ago
Alternatives and similar repositories for shebang-abuse:
Users that are interested in shebang-abuse are comparing it to the libraries listed below
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Finally a HTML that you can sight-read.☆75Updated 10 years ago
- Give pact several PIDs. When one PID dies, pact will kill all provided PIDs.☆190Updated 9 years ago
- tap curl in your editor before it gets to sh it☆87Updated 8 years ago
- If you get pw3ned, might want to fix your shell☆197Updated 7 years ago
- GitHub repos in your filesystem☆118Updated 9 years ago
- Cut, Copy and Paste files with Bash☆147Updated 9 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- undo in any program that uses readline☆162Updated 7 years ago
- a plot device☆277Updated 5 years ago
- 80 by 40 canvas that anyone can draw on.☆116Updated 8 years ago
- art for your terminal☆115Updated 5 years ago
- Solitaire. Written inside the bootloader.☆56Updated 9 years ago
- Program to compile Brainfuk to a working i686 kernel.☆31Updated 9 years ago
- state machine visual debugger☆121Updated 10 years ago
- hashpipe - pipe iff the hash matches☆407Updated 3 years ago
- Edit commit messages, authors, and timestamps during git-rebase☆203Updated 7 years ago
- A tiny bitmap font for programming☆143Updated 8 years ago
- Open Database of Firmware Test Results☆150Updated 8 years ago
- X86_64 Linux webserver in assembler☆107Updated 9 years ago
- a simple, fully featured command line note taking tool written in Rust☆358Updated 7 years ago
- Don't run "curl | sh" again. Use "curl | shed" to verify scripts before running.☆31Updated 9 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- This is a list of open source, lightweight, readable implementations of various protocols and technologies.☆77Updated 7 years ago
- memcached server built on bash + socat☆275Updated 3 months ago
- Blog from the Command Line☆141Updated 8 years ago
- Example of CPU simulation in software☆158Updated 9 years ago
- Machine learning algorithm to connect anonymous accounts to real names☆95Updated 8 years ago
- Chair and the Key☆65Updated 9 years ago
- A tool for manipulating X windows☆352Updated 4 years ago