There are no reviews yet. Be the first to send feedback to the community and the maintainers!
ebpf-guide
Ebpf faqs, samples, toolinglinux-kernel-configs
Linux kernel configs for popular distros.wisecow
CookerWhistleCounter
Counts pressure-cooker whistlesngtcp2-helper
Provides interface, design details of ngtcp2. Future, will provide easy to use ngtcp2 APIs pre-integrated with various events/ssl libs.yed-pallete
Assorted collection of yED icons/logosdev-templates
Development Templates. Github pre-commit and other hooks.sizeof
Sizeof contiki-ng, lwip2 network stackssrc
Code snippetsblockchain_blogs
My blockchain notes, slides, scripts, refsenv
My linux env setup: vimrc, bashrc, gitconfig, tmux.conf, screenrc. Installs vim-plugins and dependencies.dummyLSM
Dummy Linux Security Module (for experimentation)roll-root-ack
Enables RPL's storing MOP to ascertain e2e path establishmentvagrants
Predefined Vagrantfiles for different images/scenariosut-tool
my basic unit-test tools based on minunit + ld_preloadabacus-train
Train kids for Abacusrj-gists
gists, good-to-know commands, one-liners...log4j_kubearmor
Using Kubearmor runtime security shield to tackle log4j vulnerabilityadvgo
turnip
Test, Unfold, Reflect, Network IP addresses for its presence in the published blocklists.thinkingcap
Problem Statementskatacoda-scenarios
Katacoda ScenariosIETF_nbr_cache_mgmt
The repository maintains ID versions for the draft "Neighbor Management Policy for multihop 6lo networks". Submitted to IETF LWIG WG.ietf-data
Performance data taken in context to IETF draftsES-D2D
k8sthreatmodeling
Threat Modeling (based on STRIDE approach) for Kubernetes systems.security-rules-stash
Common rules stash for compliance authoring framework and also defence rules considering attack frameworks (such as MITRE).soarcast-sh
Multiregion cloud scanning toolsLove Open Source and this site? Check out how you can help us