thecodearchive / gitarchive
FETCH ALL THE GIT
☆33Updated 8 years ago
Alternatives and similar repositories for gitarchive:
Users that are interested in gitarchive are comparing it to the libraries listed below
- My blogging system ( Reinventing the wheel like every dev wants to do )☆73Updated 3 months ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- Read your tweets on the go via DNS TXT records☆83Updated 8 years ago
- video onion hackery (osx scripts)☆20Updated 8 years ago
- GitHub repos in your filesystem☆118Updated 9 years ago
- Corrupt stacks of arbitrary PIDs to change proctitle☆47Updated 9 years ago
- User-space deniable data encryption client.☆94Updated last year
- A fast implementation of the Tor OR code, in Go☆101Updated 8 years ago
- Local file-based password, API key, secret, recovery code store backed by GPG.☆151Updated 2 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 6 years ago
- Detect malicious homoglyphs in Go source code☆47Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- A version of pass (https://www.passwordstore.org) that uses pivy-tool instead of gpg.☆18Updated 5 years ago
- Heffalump is an endless honeypot☆209Updated 7 years ago
- hashpipe - pipe iff the hash matches☆407Updated 3 years ago
- Blog from the Command Line☆141Updated 8 years ago
- Chair and the Key☆65Updated 9 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- ☆143Updated 8 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆208Updated last year
- Jump to Full Encryption☆61Updated 8 years ago
- Minimal DNS-Over-HTTPS Server☆129Updated 6 years ago
- A Go TLS/HTTPS server demo that uses a Yubikey as the backend for it's private key☆180Updated 6 years ago
- archive gmail threads when github or gerrit issues are closed☆56Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- Hackers in yo' kernel!☆59Updated 10 years ago
- brute-force a git commit hash☆389Updated 2 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Source code for lkml.wtf.☆79Updated 4 years ago