mithrandi / ssh-key-generatorLinks
A utility for deterministically generating ssh keypairs
☆48Updated 3 years ago
Alternatives and similar repositories for ssh-key-generator
Users that are interested in ssh-key-generator are comparing it to the libraries listed below
Sorting:
- IRC to Matrix bridge☆48Updated 8 years ago
- Encrypted backups (without the backups)☆120Updated 10 years ago
- nixpkgs package status, freshness and security status monitor☆40Updated 8 years ago
- Matrix XMPP Bridge☆32Updated 9 years ago
- ZFS On Linux with crypto patches☆39Updated 10 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- An irssi plugin to connect to quassel core☆62Updated 6 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 6 years ago
- Bridges between IRC and RobustIRC☆14Updated 3 weeks ago
- cjdns swiss army knife☆48Updated 7 years ago
- Dovecot plugin to enable encrypted storage☆69Updated 9 years ago
- A git-annex special remote for hubiC -- UNMAINTAINED☆32Updated 8 years ago
- a rsync-based dump file system backup tool☆60Updated 6 years ago
- (WIP/Experimental) Ricochet implementation as Haskell Library.☆22Updated 8 years ago
- PKCS#11 token on top of gpg-agent. NOTE: Maintainers are not tracking this mirror. Do not make pull requests here, nor comment any commit…☆22Updated 6 months ago
- [This fork is not maintained] git-remote-gcrypt: A git remote helper for GPG-encrypted remotes☆145Updated 8 years ago
- Free yourself from the chains of having to acknowledging Terms of Service (AGBs) every time you connect to a captive portal☆35Updated 2 years ago
- A collection of units for the systemd user session.☆71Updated 9 years ago
- Extended verification for git tags☆133Updated 2 years ago
- Website for Modern PGP☆14Updated 7 years ago
- PAM module for two-factor authentication through signal.☆35Updated 7 years ago
- yo dawg i herd u liek livecds☆28Updated last year
- Autocrypt and more for Mail User Agents☆36Updated 10 months ago
- A prompt for ssh-agent(1) when your Yubikey needs poking☆44Updated 5 years ago
- Blockchain-based security layer for the AUR☆16Updated 7 years ago
- Secure Internet Live Conferencing☆65Updated 7 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆15Updated 9 years ago
- WeeChat plugin for Keybase chat☆14Updated 6 years ago
- CoSi command line interface☆21Updated 8 years ago