lucastheisen / cygwin-setupLinks
Automation to manage a cygwin installation
☆16Updated 8 years ago
Alternatives and similar repositories for cygwin-setup
Users that are interested in cygwin-setup are comparing it to the libraries listed below
Sorting:
- Salt recipe to automatically secure sshd (and piss off the NSA)☆16Updated 9 years ago
- A Next Generation Honeypot for a 2016 Oregon State Senior Project☆67Updated 9 years ago
- System Architecture Mapper☆173Updated 8 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 9 years ago
- A public database for software and firmware hashes☆215Updated 9 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- Open Database of Firmware Test Results☆151Updated 9 years ago
- Configures a regular ubuntu server to run as a tor hidden server running apache utilising ansible☆41Updated 6 years ago
- An unofficial Microsoft Machine Learning Server Docker image.☆142Updated 8 years ago
- Pretty Curved Privacy☆122Updated last month
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆151Updated 4 years ago
- ☆97Updated 8 years ago
- Standalone SSH server for Windows☆224Updated 2 years ago
- ☆115Updated 10 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated 2 years ago
- A Linux shell script to improve your privacy online☆86Updated 9 years ago
- nixarmor is a linux hardening automation project☆64Updated 3 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 9 years ago
- encrypt and decrypt small files using OpenSSH keys☆70Updated 12 years ago
- A Shell Script To Take Care Of Ubuntu Basics☆143Updated 5 years ago
- Privacy Cactus is a minimalistic theme for bloggers☆28Updated 8 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- Moved to Hands On Docker, click for details.☆35Updated 9 years ago
- ☆56Updated 8 years ago
- Combine and deduplicate popular /etc/hosts blocking lists.☆117Updated 4 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆321Updated 8 years ago
- A tool to automate key distribution with user authorization☆161Updated 4 years ago
- Using serverless functions to provide an API for checking potential passwords against an enormous corpus of passwords leaked from securit…☆114Updated 8 years ago
- Wireshark-Specific Dissector Language☆199Updated 8 years ago