Bookmarks - wr0ng.nameShaared links2020-09-28T19:21:47+02:00https://links.wr0ng.name/https://links.wr0ng.name/https://links.wr0ng.name/Shaarlikifarunix.com - *Nix Tips and Tutorialshttps://links.wr0ng.name/?GMvWjA2020-04-24T13:23:20+02:002020-09-28T19:17:27+02:00 — Direct link]]>Floss Manuals - Free Manuals for Free Softwarehttps://links.wr0ng.name/?YRmEGw2020-03-06T10:10:52+01:002020-09-28T19:18:21+02:00
We create booklets, course materials and manuals for creative, cultural and campaigning uses of Free Software.
— Direct link]]>Open-source Python implementation of TAXII Services | EclecticIQhttps://links.wr0ng.name/?hdzk9g2020-02-26T17:11:44+01:002020-02-26T17:11:44+01:00 — Direct link]]>LIRC - Linux Infrared Remote Controlhttps://links.wr0ng.name/?DvBLgQ2020-02-08T12:20:52+01:002020-09-28T19:18:56+02:00
Recent linux kernels makes it possible to use some IR remote controls as regular input devices. Sometimes this makes LIRC redundant. However, LIRC offers more flexibility and functionality and is still the right tool in a lot of scenarios.
The most important part of LIRC is the lircd daemon which decodes IR signals received by the device drivers and provides the information on a socket. It also accepts commands for IR signals to be sent if the hardware supports this.
The user space applications allows you to control your computer with your remote control. You can send X11 events to applications, start programs and much more on just one button press. The possible applications are obvious: Infra-red mouse, remote control for your TV tuner card or CD-ROM, shutdown by remote, program your VCR and/or satellite tuner with your computer, etc. Using lirc on Raspberry Pie is quite popular these days.
— Direct link]]>MQTT Explorer | An all-round MQTT client that provides a structured topic overviewhttps://links.wr0ng.name/?qscqog2020-01-31T01:15:22+01:002020-01-31T01:15:22+01:00— Direct link]]>OpenHAB - Tasmota Documentationhttps://links.wr0ng.name/?HJINew2020-01-31T01:13:56+01:002020-01-31T01:13:56+01:00
By following the guide below you'll be able to observe, control and manage your Tasmotamodules from your openHAB system. If you are new to openHAB, please learn about the basic concepts and the initial setup. The below article will not cover any basics which are out of scope to the Tasmota integration.
— Direct link]]>Apache Loungehttps://links.wr0ng.name/?B1uv0A2019-12-17T14:52:25+01:002019-12-25T00:04:10+01:00 — Direct link]]>What Really Happens On Your Network? Part Seven – Pi-hole®: A black hole for Internet advertisementshttps://links.wr0ng.name/?IHz_8w2019-07-27T20:48:45+02:002020-09-28T19:21:47+02:00— Direct link]]>Rajkosto's possibly useful tools for the Nintendo Switchhttps://links.wr0ng.name/?jkSFPw2018-10-21T11:20:19+02:002018-10-21T11:20:19+02:00
A reimplementation of fusee-launcher in C++ for Windows platforms.
Lets you launch fusee/shofEL2 payloads to a USB connected Switch in RCM mode.
— Direct link]]>File for Windowshttps://links.wr0ng.name/?KgCcwg2018-09-21T10:13:43+02:002018-09-21T10:13:43+02:00— Direct link]]>Genmahttps://links.wr0ng.name/?YDGeLw2017-10-17T13:29:53+02:002017-10-17T13:29:53+02:00#ViePrivée#HygièneNumérique #Geek#LogicielsLibres#Opensource #Conférences#Vulgarisation #EducationPopulaire — Direct link]]>KiTTY - Welcomehttps://links.wr0ng.name/?DMKTPA2017-10-17T11:22:05+02:002017-10-17T11:22:05+02:00
KiTTY is only designed for the Microsoft® Windows® platform. For more information about the original software, or pre-compiled binaries on other systems, you can go to the Simon Tatham PuTTY page.
KiTTY has all the features from the original software, and adds many others as described.
— Direct link]]>MobaXterm free Xserver and tabbed SSH client for Windowshttps://links.wr0ng.name/?2ZjgLw2017-10-17T11:19:36+02:002017-10-17T11:19:36+02:00— Direct link]]>Great Scott Gadgetshttps://links.wr0ng.name/?cECURg2017-07-21T14:36:49+02:002017-07-21T14:36:49+02:00
Everything we produce at Great Scott Gadgets is open source, including all our hardware designs, software, and educational content. Our goal is to enable you to do things nobody has done before. We do that by building innovative hardware and software tools and by educating the community both online and through industry events. Most importantly, we support the community by releasing all of our work under open source licenses.
— Direct link]]>Tobi Oetiker - Tobi Oetiker's Toolboxhttps://links.wr0ng.name/?CWHF6w2017-07-12T17:14:39+02:002017-07-12T17:14:39+02:00— Direct link]]>Guides & How-Tohttps://links.wr0ng.name/?JJzhKg2017-07-07T17:14:45+02:002017-07-07T17:14:45+02:00
[May 29, 2007] - A complete Guide to Ris & Linux - Still a work in progress but almost complete
Clear your cache before downloading the guide, look the date as reference
Ris for Linux Tools: ris-linux-0.4.tar.gz
A working tftpd/samba session log, check it against your own log if you get problems
WINPE RIS from Linux - How to setup a ris server to boot winpe from network
RIS for Linux - Install windows using ris, without having a window server (multiplatform)
BINL protocol explained - Work in progress, Binl protocol analysis
Sources hosted on:
https://github.com/sherpya/ris-linux/ — Direct link]]>Open Book Projecthttps://links.wr0ng.name/?ixbPCw2017-07-06T15:14:26+02:002017-07-06T15:14:26+02:00— Direct link]]>SuperTuxKarthttps://links.wr0ng.name/?1Kfpew2017-07-05T11:55:32+02:002017-07-05T11:55:32+02:00— Direct link]]>OpenToonzhttps://links.wr0ng.name/?8OSggQ2017-07-05T11:54:55+02:002017-07-05T11:54:55+02:00
This is software for producing a 2D animation.
It is based on the software "Toonz", which was developed by Digital Video S.p.A. in Italy, customized by Studio Ghibli, and has been used for creating its works for many years. Dwango launches this OpenToonz project, in cooperation with Digital Video and Studio Ghibli.
This software can be used by anyone free of charge, no matter whether the purpose of use is commercial or not.
This is available as an open source, so that users can modify its source code freely.
We aim to develop a new platform for connecting the academic research into frontline animation production.
— Direct link]]>Suricata | Open Source IDS / IPS / NSM enginehttps://links.wr0ng.name/?sn_O_Q2017-06-23T14:05:57+02:002017-06-23T14:05:57+02:00
Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency.
The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.
— Direct link]]>NSA OSS Technologieshttps://links.wr0ng.name/?ssmqCw2017-06-19T14:28:26+02:002017-06-19T14:28:26+02:00— Direct link]]>RegExr: Learn, Build, & Test RegExhttps://links.wr0ng.name/?2WCMVg2017-06-12T11:48:31+02:002017-06-12T11:48:31+02:00
Results update in real-time as you type.
Roll over a match or expression for details.
Save & share expressions with others.
Use Tools to explore your results.
Browse the Library for help & examples.
Undo & Redo with Ctrl-Z / Y.
Search for & rate Community patterns.
— Direct link]]>NaCl: Networking and Cryptography libraryhttps://links.wr0ng.name/?Vl-cYQ2017-06-08T16:12:28+02:002017-06-08T16:12:28+02:00
The current version of NaCl supports C and C++. Support for Python is a high priority.
— Direct link]]>@Superfellhttps://links.wr0ng.name/?BDrGQg2017-05-23T13:17:50+02:002017-05-23T13:17:50+02:00
Here's a collection of applications & developer tools for use with Salesforce.com, these are mostly for Mac OSX.
— Direct link]]>The No More Ransom Projecthttps://links.wr0ng.name/?tQKQfg2017-05-17T17:43:38+02:002017-05-17T17:43:38+02:00
The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security – with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals.
— Direct link]]>Sylius/Sylius: eCommerce PHP framework built on top of Symfony with component-based architecture and format-agnostic rendering. (HTML/JSON/XML)https://links.wr0ng.name/?NkIo_w2017-05-10T13:25:25+02:002017-05-10T13:25:25+02:00— Direct link]]>API Platform: Creating your First API with API Platform, in 5 Minuteshttps://links.wr0ng.name/?ZW_b1A2017-05-10T13:20:53+02:002017-05-10T13:20:53+02:00
It embraces JSON for Linked Data (JSON-LD) and Hydra Core Vocabulary web standards.
Build a working and fully-featured CRUD API in minutes. Leverage the awesome features of the tool to develop complex and high performance API-first projects.
If you are starting a new project, the easiest way to get API Platform up is to install the API Platform Standard Edition.
— Direct link]]>Free IP address to ASN databasehttps://links.wr0ng.name/?_ZDz7Q2017-04-30T19:13:30+02:002017-04-30T19:13:30+02:00
Free IP address to ASN database
Downloadable, easy to parse, updated hourly.
— Direct link]]>SoapUI | Functional Testing for SOAP and REST APIshttps://links.wr0ng.name/?zkIm5A2017-04-27T09:32:22+02:002017-04-27T09:32:22+02:00— Direct link]]>DBAD by philsturgeonhttps://links.wr0ng.name/?ImyQIQ2017-04-26T17:34:12+02:002017-04-26T17:34:12+02:00
As developers we all want to protect our code from dicks that try to steal, sell, infringe or just generally rip us off. For this we have licenses like GPL, MIT, etc.
Sometimes however, you release a project where you just don't care what happens to the code. For this Sam Hocevar created the WTFPL which is a brilliant license.
— Direct link]]>theZoo aka Malware DB by ytisfhttps://links.wr0ng.name/?Kbo7gg2017-04-25T10:27:58+02:002017-04-25T10:27:58+02:00
Github: https://github.com/ytisf/theZoo — Direct link]]>GitHub - k4m4/movies-for-hackers: 🎬 A curated list of movies every hacker & cyberpunk must watch.https://links.wr0ng.name/?iSAzQQ2017-04-23T11:12:55+02:002017-04-23T11:12:55+02:00
— Direct link]]>LibreTaxi - free and open source Uber/Lyft alternative.https://links.wr0ng.name/?oaYO1Q2017-04-23T11:08:15+02:002017-04-23T11:08:15+02:00— Direct link]]>Andrew Dolgov / tt-rss | GitLabhttps://links.wr0ng.name/?W6m7Uw2017-04-15T18:43:18+02:002017-04-15T18:43:18+02:00 http://tt-rss.org — Direct link]]>The open archive HALhttps://links.wr0ng.name/?BI3gUA2017-04-15T11:07:54+02:002017-04-15T11:07:54+02:00
For the attention of the authors
The deposit must be made in agreement with the co-authors and in the respect for the policy of the publishers.
The deposit is subject of a control, HAL reserves the right to refuse items that do not meet the criteria of the archive.
Any deposit is definitive, no withdrawals will be made after the on-line posting of the publication.
Text files in pdf format or image files are sent to CINES for long-term archiving.
For the attention of the readers
In a context of electronic distribution, every author keep all its intellectual property rights.
— Direct link]]>E.T. Proxy Logs Checker [ETPLC]https://links.wr0ng.name/?2xg2Cg2017-04-07T16:50:15+02:002017-04-07T16:50:15+02:00
It's a production ready version, all feedback is welcome.
— Direct link]]>ThreatHunting Homehttps://links.wr0ng.name/?Aphstg2017-04-05T13:27:27+02:002017-04-05T13:27:27+02:00
On the other hand, there are a lot of individuals out there who have written blog posts, conference presentations or whatever that detail some of their favorite hunting procedures. The problem is that these procedures are scattered all over the Internet, and are sometimes hard to find.
That’s why the ThreatHunting Project exists. Here you will find links to a number of different published hunting procedures. It my hope that this will give you some concrete starting points, or if you are an experienced hunter, help you find additional techniques to add to your repertoire.
— Direct link]]>Application Threat Modeling - OWASPhttps://links.wr0ng.name/?itb3qQ2017-04-04T17:41:07+02:002017-04-04T17:41:07+02:00— Direct link]]>Interconnexion réseau & Logiciel Libre ~ inetdoc.nethttps://links.wr0ng.name/?ac0g5g2017-04-04T17:10:19+02:002017-04-04T17:10:19+02:00
It contains articles, guides, labs and presentations which can be used as
teaching or self learning material
As the documents have to be maintained over years, static web pages are the
most suitable way to publish them
— Direct link]]>GitHub - aainz/TinyNuke: zeus-style banking trojanhttps://links.wr0ng.name/?9dY9Jg2017-04-03T15:15:09+02:002017-04-03T15:15:09+02:00
- Formgrabber and Webinjects for Firefox, Internet Explorer and Chrome. Can inject x86 as well as x64 browsers.
- Reverse SOCKS 4
- HVNC like Hidden Desktop
- Trusteer Bypass
- ~32kb binary with obfuscated strings ~20kb without
— Direct link]]>GitHub - jentery/routledgeCompanionMSDH: Repository for the ROUTLEDGE COMPANION TO MEDIA STUDIES AND DIGITAL HUMANITIEShttps://links.wr0ng.name/?yyo7rg2017-03-30T10:22:11+02:002017-03-30T10:22:11+02:00— Direct link]]>GitHub - YOURLS/YOURLS: Your Own URL Shortener.https://links.wr0ng.name/?JnO4NQ2017-03-21T17:31:14+01:002017-03-21T17:31:14+01:00
Quick Start
To get started, check yourls.org!
Learn more tweaks in the Wiki documentation.
— Direct link]]>GitHub - shish/shimmie2: Shish's official Shimmie code repositoryhttps://links.wr0ng.name/?UwV51g2017-03-03T09:15:08+01:002017-03-03T09:15:08+01:00
Requires a standard LAMP stack as provided by any normal web host. It can also use PostgreSQL as a database, which is recommended for high-load sites.
This is probably my most popular project, with a team of 10 coders, hundreds of installations, and thousands of users online at once.
Official website: http://code.shishnet.org/shimmie2/ — Direct link]]>Essence by essencehttps://links.wr0ng.name/?sZd--Q2017-02-20T10:00:42+01:002017-02-20T10:00:42+01:00— Direct link]]>Ransomware Trackerhttps://links.wr0ng.name/?qDfolQ2017-02-17T16:05:00+01:002017-02-17T16:05:00+01:00
Ransomware Tracker provides a short guideline for both home users and enterprises on how to avoid becoming a victim of Ransomware.
Ransomware Tracker offers various blocklists. These blocklists allows enterprises to block malicious traffic towards known Ransomware infrastructure at the network edge, e.g. by blocking them on the corporate firewall, web proxy or in the local DNS server.
— Direct link]]>Guide de démarrage rapide WeeChathttps://links.wr0ng.name/?Qd6AbA2017-02-14T13:57:13+01:002017-02-14T13:57:13+01:00https://weechat.org/doc
— Direct link]]>OAV.Nethttps://links.wr0ng.name/?la0pJg2017-01-24T13:35:14+01:002017-01-24T13:35:14+01:00
Because I never had the time to make that, so this website is mostly my own website and portail for my own projects.
-> Some copy of good documentation about several subjects that are very interressing...
— Direct link]]>Framasphere*https://links.wr0ng.name/?AaTszA2016-12-13T15:02:04+01:002016-12-13T15:02:04+01:00— Direct link]]>Dégooglisons Internet - Accueil - Framasofthttps://links.wr0ng.name/?4UpyGA2016-12-13T14:09:29+01:002016-12-13T14:09:29+01:00
Au milieu des multinationales tentaculaires, quelques organisations non-lucratives continuent de lutter activement pour un Web ouvert et respectueux des internautes.
— Direct link]]>Furrtek.orghttps://links.wr0ng.name/?Oj2p6g2016-12-12T23:25:43+01:002016-12-12T23:25:43+01:00
Des fois ça marche, des fois ça marche pas.
Artiste malgré moi, passionné et ouvert. Probablement sociopathe (c'est pas moi qui le dit).
— Direct link]]>