• Stars
    star
    1
  • Language
  • Created almost 3 years ago
  • Updated almost 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Katacoda Scenarios

More Repositories

1

ebpf-guide

Ebpf faqs, samples, tooling
C
42
star
2

linux-kernel-configs

Linux kernel configs for popular distros.
Shell
27
star
3

wisecow

Shell
6
star
4

CookerWhistleCounter

Counts pressure-cooker whistles
Java
5
star
5

ngtcp2-helper

Provides interface, design details of ngtcp2. Future, will provide easy to use ngtcp2 APIs pre-integrated with various events/ssl libs.
3
star
6

yed-pallete

Assorted collection of yED icons/logos
3
star
7

dev-templates

Development Templates. Github pre-commit and other hooks.
Shell
2
star
8

sizeof

Sizeof contiki-ng, lwip2 network stacks
C
2
star
9

personaltools

HTML
2
star
10

src

Code snippets
Python
2
star
11

blockchain_blogs

My blockchain notes, slides, scripts, refs
Shell
2
star
12

env

My linux env setup: vimrc, bashrc, gitconfig, tmux.conf, screenrc. Installs vim-plugins and dependencies.
Vim Script
2
star
13

dummyLSM

Dummy Linux Security Module (for experimentation)
C
2
star
14

roll-root-ack

Enables RPL's storing MOP to ascertain e2e path establishment
Makefile
2
star
15

vagrants

Predefined Vagrantfiles for different images/scenarios
2
star
16

ut-tool

my basic unit-test tools based on minunit + ld_preload
C
1
star
17

abacus-train

Train kids for Abacus
Shell
1
star
18

rj-gists

gists, good-to-know commands, one-liners...
Shell
1
star
19

log4j_kubearmor

Using Kubearmor runtime security shield to tackle log4j vulnerability
HTML
1
star
20

turnip

Test, Unfold, Reflect, Network IP addresses for its presence in the published blocklists.
Go
1
star
21

advgo

Go
1
star
22

thinkingcap

Problem Statements
1
star
23

IETF_nbr_cache_mgmt

The repository maintains ID versions for the draft "Neighbor Management Policy for multihop 6lo networks". Submitted to IETF LWIG WG.
1
star
24

ietf-data

Performance data taken in context to IETF drafts
Shell
1
star
25

ES-D2D

C
1
star
26

k8sthreatmodeling

Threat Modeling (based on STRIDE approach) for Kubernetes systems.
HTML
1
star
27

security-rules-stash

Common rules stash for compliance authoring framework and also defence rules considering attack frameworks (such as MITRE).
XSLT
1
star