infinity0 / uberimg
yo dawg i herd u liek livecds
☆28Updated 11 months ago
Alternatives and similar repositories for uberimg:
Users that are interested in uberimg are comparing it to the libraries listed below
- Lazy man's, user-mode union file system☆31Updated 9 years ago
- Ansible role to install & maintain Tor Hidden Services☆28Updated 6 years ago
- Command-line access to Up1☆41Updated 6 years ago
- Safely print shared library dependencies (similar to ldd)☆23Updated last year
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆15Updated 8 years ago
- Specifications of the Futuristic Connectivity protocol☆28Updated 8 years ago
- Command-line utility to control Tor.☆89Updated last year
- Tool to analyze a patch series for dependencies☆15Updated last month
- Easy creation of Tor Hidden Services☆39Updated 9 years ago
- Repository merger for apt-based distros☆14Updated 5 years ago
- An irssi plugin to connect to quassel core☆62Updated 6 years ago
- Zero-configuration LAN file transfer.☆13Updated 11 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- Prosody module that suggest users to enable OTR (not mandatory)☆40Updated 3 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 9 years ago
- Server automation recipes for the LEAP Platform. Written mostly using puppet, and licensed under the GPLv3.☆50Updated 6 years ago
- A list of XMPP servers available as hidden services for use with the Prosody server and mod_onions☆18Updated 5 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- Notes relating to secure messaging☆19Updated 8 years ago
- ☆30Updated 9 years ago
- Protected headers for cryptographically-secure e-mail☆16Updated last year
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Updated 10 years ago
- Encrypted backups (without the backups)☆121Updated 10 years ago
- Liberté Linux, a live distribution serving as a communication aid in hostile environments.☆83Updated 8 years ago
- TPM 1.2 management tool with an easy-to-use graphical user interface☆39Updated 2 years ago
- LUKS support for storing keys in TPM NVRAM☆15Updated 7 years ago
- cjdns swiss army knife☆48Updated 6 years ago
- Home of NCrypt☆32Updated 7 years ago
- Print your GPG key fingerprint with LaTeX☆14Updated 6 years ago
- Trolling the Web of Trust☆42Updated 10 years ago