richardj / wq
:wq
☆67Updated 6 years ago
Alternatives and similar repositories for wq:
Users that are interested in wq are comparing it to the libraries listed below
- HTTP documentation right in your terminal.☆35Updated 6 years ago
- ☆143Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Signal Desktop using https://github.com/brave/muon instead of Chrome. Not affiliated with WhisperSystems.☆122Updated 7 years ago
- HOSTING YOUR FROG TIPS ON GITHUB IS EASY☆33Updated 6 years ago
- timing attack to check if devtools are open☆52Updated 8 years ago
- Chrome Extension that invisibly lowers the volume of YouTube videos over time, then suddenly blasts them at max.☆60Updated 4 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 6 years ago
- ☆29Updated 6 years ago
- Everyone who has a merged pull request is invited to become an admin of this repo.☆36Updated last year
- A DNS server that resolves everything to cats.☆202Updated 8 years ago
- A server that watches a file/folder and notifies clients about changes☆59Updated 8 years ago
- badsite.io is intended for manual testing of web security in clients and test tolos☆18Updated 6 years ago
- Your best is an idiot☆137Updated 8 years ago
- https://noncombatant.org/2014/03/11/privacy-and-security-settings-in-chrome/☆17Updated 9 years ago
- a bash script that generates hearty laughter☆15Updated 8 years ago
- drop in replacement for tail -F that asks you if you are still watching☆237Updated 3 years ago
- Hackers in yo' kernel!☆59Updated 9 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Useful config-related files☆94Updated 4 years ago
- A ncurses animation to make decryption look like, well, decryption.☆240Updated 5 years ago
- ☆56Updated 10 years ago
- If you get pw3ned, might want to fix your shell☆196Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 7 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- A no-frills recipe blog.☆19Updated 2 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago