A toolkit for building containers if you don't have Docker installed. Automatically garbage collects container images. Multiple output formats. Pluggable. Does not require running as root.
Namechecked for use with faasd.
BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides replacements for most of the utilities you usually find in GNU fileutils, shellutils, etc. The utilities in BusyBox generally have fewer options than their full-featured GNU cousins; however, the options that are included provide the expected functionality and behave very much like their GNU counterparts. BusyBox provides a fairly complete environment for any small or embedded system.
BusyBox has been written with size-optimization and limited resources in mind. It is also extremely modular so you can easily include or exclude commands (or features) at compile time. This makes it easy to customize your embedded systems. To create a working system, just add some device nodes in /dev, a few configuration files in /etc, and a Linux kernel.
Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications. It currently provides multiple lightweight and hackable wireless protocol stacks, multiple highly customizable offensive modules, a chaining operator allowing to easily combine attack modules in order to build complex attack workflows (kind of like Metasploit), and support of multiple devices, such as HCI devices, Crazy Radio PA, RZUSBStick, BTLEJack, Nordic and Ubertooth sniffers.
Definitely not easy to use. I recommend working with a couple of other toolsets first, and then tinker one utility at a time with these.
This is a list of small, free, or experimental tools that might be useful in building your game / website / interactive project. Although I’ve included ‘standards’, this list has a focus on artful tools and toys that are as fun to use as they are functional.
The goal of this list is to enable making entirely outside of closed production ecosystems or walled software gardens.
A set of tools and libraries to access human-editable, plain text databases called recfiles. The data is stored as a sequence of records, each record containing an arbitrary number of named fields. They're basically flat files. Field names and types are specified with %, data is in field name: value format. It's sort of like key/value, but more structured. Fields can be mandatory or forbidden. Primary keys, unique fields, automatically incrementing counters and timestamps. Template support for running reports. SQL-like joins and foreign keys. Individual fields can be encrypted. Conversion to and from several formats.
Don't know what type of hash it is? Name That Hash will name that hash type! Identify MD5, SHA256 and 3000+ other hashes. Comes with a neat web app (which is optional). Can also be pulled in as a Python module for use in other projects.
A collection of pure POSIX sh alternatives to external processes.
An open source firmware for DSO-138 oscilloscope, based on the ARM Cortex M3 STM32F103 processor core. The firmware adds two analog channels, two digital channels (if you patch onto pins PA13 and PA14 on the board), a serial interface (over USB, probably), selectable source triggers, support for a retrofitted rotary encoder, and 2k sample depth. The tradeoff is that 10 µs sampling had to be removed to make room.
To flash the firmware you have to use a TTL-to-USB converter to patch directly onto jumpers J1 and J2 on the mainboard. No USB support, remember?
Threat models and tools for staying safe, private and informed while Online, used by the average person.
PolyGlot is a tool that is designed to help in the design, creation, and publication of constructed languages. Lexicon builder, grammar constructor, search, orthography, parts of speech, document generation, custom fonts, logographics.
A curated list of telco resources and projects.
Useful resources for using IPFS and building things on top of it.
Wallabag-client is a command line client for the self hosted read-it-later app wallabag. Unlike to other services, wallabag is free and open source.
Wallabag-client is refactored version of existed wallabag-cli tool.
List articles, read articles, add and delete entries, make minor edits.
Repository containing useful links for all things Physical Security.
Github repo for a blog series about latest-gen Python stuff. Linked because I hate pages that point to pages when I just want to sit and read.
This article series is a guide to modern Python tooling with a focus on simplicity and minimalism.1 It walks you through the creation of a complete and up-to-date Python project structure, with unit tests, static analysis, type-checking, documentation, and continuous integration and delivery.
This guide is aimed at beginners who are keen to learn best practises from the start, and seasoned Python developers whose workflows are affected by boilerplate and workarounds required by the legacy toolbox.
Classes teach you all about advanced topics within CS, from operating systems to machine learning, but there’s one critical subject that’s rarely covered, and is instead left to students to figure out on their own: proficiency with their tools. We’ll teach you how to master the command-line, use a powerful text editor, use fancy features of version control systems, and much more!
Students spend hundreds of hours using these tools over the course of their education (and thousands over their career), so it makes sense to make the experience as fluid and frictionless as possible. Mastering these tools not only enables you to spend less time on figuring out how to bend your tools to your will, but it also lets you solve problems that would previously seem impossibly complex.
Translated into multiple languages.
A curated list of awesome stuff around the Matrix protocol, network, and ecosystem.
Lynis is a security auditing tool for systems based on UNIX like Linux, macOS, BSD, and others. It performs an in-depth security scan and runs on the system itself. The primary goal is to test security defenses and provide tips for further system hardening. It will also scan for general system information, vulnerable software packages, and possible configuration issues. Lynis was commonly used by system administrators and auditors to assess the security defenses of their systems.
Automated security auditing
Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
3480 links, including 121 private