google / catnipLinks
Catnip Sandbox
☆26Updated 8 years ago
Alternatives and similar repositories for catnip
Users that are interested in catnip are comparing it to the libraries listed below
Sorting:
- Image for running Phabricator on App Engine☆19Updated 9 years ago
- ☆52Updated 5 years ago
- ☆49Updated 4 years ago
- ☆29Updated 11 years ago
- Testimony is a single-machine, multi-process architecture for sharing AF_PACKET data across processes, allowsing packets to be copied fro…☆109Updated 4 years ago
- ☆12Updated 3 years ago
- CrunchyCrypt - Safe and Simple Cryptography☆126Updated 6 years ago
- Clerk is an open-source IPFIX generator using https://github.com/google/testimony for packet sniffing☆38Updated 7 years ago
- A parallel SSH-based remote machine management system☆85Updated 10 years ago
- Password caching module with advanced policies for PAM.☆34Updated 4 years ago
- Experiments in converting bzip2 API to be RPC-based☆14Updated 9 years ago
- ☆13Updated 6 years ago
- A monitor that checks that Certificate Transparency Logs are complying with RFC 6962 and the Chromium Certificate Transparency Log Policy…☆40Updated 2 years ago
- Public Profile Repository for Rekall Memory Forensic.☆101Updated 5 years ago
- Svalbard is a distributed backup system for long-term protection of secret data.☆35Updated 7 years ago
- ☆29Updated 12 years ago
- MattockFS Computer Forensics File-System☆12Updated 7 years ago
- Uses pcap to inspect tchannel traffic over a network interface☆28Updated 9 years ago
- ☆171Updated 7 years ago
- Server for the Mozilla Telemetry project☆42Updated 7 years ago
- C code indexer using language semantic from clang☆60Updated 6 years ago
- Flexible and powerful data analysis / manipulation library for Python, providing labeled data structures similar to R data.frame objects,…☆27Updated 7 years ago
- ☆51Updated last year
- ☆32Updated 9 years ago
- LIBrary for Asynchronous File Descriptor Transfer☆41Updated 7 years ago
- Certificate Transparency RFC☆80Updated 4 years ago
- Repository for various tools around security☆41Updated last year
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 11 years ago
- Trie implementation of a CIDR lookup table☆18Updated 10 years ago
- The CloudProxy Tao for Trustworthy Computing☆37Updated 8 years ago