njhartwell / pw3nage
If you get pw3ned, might want to fix your shell
☆196Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for pw3nage
- memcached server built on bash + socat☆276Updated 3 weeks ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 3 years ago
- Edit commit messages, authors, and timestamps during git-rebase☆203Updated 7 years ago
- ☆142Updated 8 years ago
- tap curl in your editor before it gets to sh it☆87Updated 7 years ago
- The complete opposite of a font☆233Updated 7 years ago
- Open Database of Firmware Test Results☆150Updated 8 years ago
- Highlight insecure SSL configuration in Vim (works for all OpenSSL/ LibreSSL cipher strings, independent of the filetype)☆110Updated 7 years ago
- a simple, fully featured command line note taking tool written in Rust☆357Updated 7 years ago
- ಠ_ಠ Vim plugin to disapprove deeply indented code. ಠ_ಠ☆561Updated 5 years ago
- Decentralized Issue Tracking for git☆459Updated last year
- A command-line journal that is distributed and encrypted, making it easy to jot notes☆341Updated 5 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆158Updated 7 months ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆761Updated 4 years ago
- Instantly jump to your ag or ripgrep matches.☆598Updated last year
- Live htop 📺☆208Updated 5 years ago
- The Plain Text File Manager☆606Updated 4 years ago
- Give pact several PIDs. When one PID dies, pact will kill all provided PIDs.☆191Updated 8 years ago
- ☆235Updated 10 years ago
- ☆363Updated 2 years ago
- An intuitive yaml-driven bash auto-completion framework☆97Updated 6 years ago
- A secret manager backed by Keybase and KBFS.☆434Updated 3 years ago
- rcon is a lightweight resource virtualization tool for linux processes. This is one-binary.☆378Updated 3 years ago
- Sha256 vulnerability for full rounds. Circular hash attack.☆153Updated 7 years ago
- ☆97Updated 7 years ago