magcius / keylogLinks
☆10Updated 10 years ago
Alternatives and similar repositories for keylog
Users that are interested in keylog are comparing it to the libraries listed below
Sorting:
- Use some TLS servers for trusted timestamping☆42Updated 10 years ago
- Improved shell environment: sane dotfiles backed by my daily work optimized for solarized theme☆24Updated 8 years ago
- Pretty Curved Privacy☆122Updated last month
- GitHub repos in your filesystem☆117Updated 10 years ago
- paexec - distributes tasks over network or CPUs☆65Updated last year
- SC4 - Strong Crypto for Mere Mortals☆122Updated 4 years ago
- Collection of ZFS utilities.☆67Updated 8 years ago
- Unofficial 1Password Chrome extension☆38Updated 10 years ago
- Generate self-signed x509 certificates valid for multiple URLs/IPs☆144Updated 8 years ago
- An ircd backed by etcd☆75Updated 8 years ago
- Git as a KV store in Ruby☆121Updated 10 years ago
- Totally Isolated TLS Unwrapping Server☆110Updated 5 years ago
- Process supervision shell for daemontools, perp, s6 and runit☆57Updated 2 years ago
- Finally a HTML that you can sight-read.☆76Updated 11 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated 2 years ago
- A docker image with the Rainloop mail client installed☆45Updated 7 years ago
- Open Database of Firmware Test Results☆151Updated 9 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 7 years ago
- CLI to pipe data through Redis Pub/Sub☆47Updated 11 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆151Updated 4 years ago
- Password Generation using Markov models, Huffman trees, and Charles Dickens☆43Updated 6 years ago
- ACME automatic certificate acquisition tool. Repository has moved to:☆69Updated 10 years ago
- X86_64 Linux webserver in assembler☆107Updated 10 years ago
- bloc is a better locate tool for finding files in your system☆19Updated 7 years ago
- Let your tests describe your program behavior☆62Updated 9 years ago
- An implementation of the unix commands yes, cat, and echo in as few bytes of executable as possible☆62Updated 9 years ago
- bt.sh: timechart-like tracing with bash☆96Updated 3 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 14 years ago
- Read the TPP!☆28Updated 2 years ago
- CLI Personal assistant☆46Updated 8 years ago