🔥 hawk-eye | Python
🎯 Primary Use Case:
Scanning various data sources for Personally Identifiable Information (PII) and secrets to prevent data breaches and cyber threats.
✨ Key Features:
• Scans Filesystem for PII and sensitive data
• Scans S3 for PII and sensitive data
• Scans MySQL for PII and sensitive data
• Scans Redis for PII and sensitive data
• Scans Google Cloud Storage for PII and sensitive data
📖 Summary:
Hawk-eye is a command-line tool that scans various data sources, including file systems, cloud storage (S3, GCS, Firebase), and databases (MySQL, Redis), for PII and secrets. It uses advanced text analysis and OCR to delve into various document formats, providing comprehensive data protection across platforms.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Scanning various data sources for Personally Identifiable Information (PII) and secrets to prevent data breaches and cyber threats.
✨ Key Features:
• Scans Filesystem for PII and sensitive data
• Scans S3 for PII and sensitive data
• Scans MySQL for PII and sensitive data
• Scans Redis for PII and sensitive data
• Scans Google Cloud Storage for PII and sensitive data
📖 Summary:
Hawk-eye is a command-line tool that scans various data sources, including file systems, cloud storage (S3, GCS, Firebase), and databases (MySQL, Redis), for PII and secrets. It uses advanced text analysis and OCR to delve into various document formats, providing comprehensive data protection across platforms.
🔗 Links:
• View Project
================
🔓 Open Source
🌟 perspt | Rust
🎯 Primary Use Case:
Interacting with various AI models from multiple providers directly in the terminal.
✨ Key Features:
• Interactive Chat Interface
• Advanced Streaming
• Automatic Provider Detection
📖 Summary:
Perspt is a high-performance CLI application built with Rust that allows users to chat with various AI models from different providers directly in their terminal. It leverages the `genai` crate for unified API access and offers features like real-time streaming, automatic provider detection, and a customizable terminal UI. Perspt aims to provide a reliable and efficient way to explore and interact with the latest AI models.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🎯 Primary Use Case:
Interacting with various AI models from multiple providers directly in the terminal.
✨ Key Features:
• Interactive Chat Interface
• Advanced Streaming
• Automatic Provider Detection
📖 Summary:
Perspt is a high-performance CLI application built with Rust that allows users to chat with various AI models from different providers directly in their terminal. It leverages the `genai` crate for unified API access and offers features like real-time streaming, automatic provider detection, and a customizable terminal UI. Perspt aims to provide a reliable and efficient way to explore and interact with the latest AI models.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🌟 depyler | Rust
🎯 Primary Use Case:
Transitioning Python codebases to energy-efficient and memory-safe Rust code.
✨ Key Features:
• Automatic Transpilation (Python to Rust)
• Memory Safety Guarantees
• Performance Optimization (Energy Efficiency, Speed)
• Testing & Verification
• AWS Lambda Transpilation
📖 Summary:
Depyler is a Python-to-Rust transpiler designed to convert Python code into high-performance, memory-safe Rust. It offers features like automatic transpilation, memory safety guarantees, performance optimization, and testing & verification. The tool also supports AWS Lambda transpilation, aiming to reduce energy consumption and improve speed in cloud environments.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Transitioning Python codebases to energy-efficient and memory-safe Rust code.
✨ Key Features:
• Automatic Transpilation (Python to Rust)
• Memory Safety Guarantees
• Performance Optimization (Energy Efficiency, Speed)
• Testing & Verification
• AWS Lambda Transpilation
📖 Summary:
Depyler is a Python-to-Rust transpiler designed to convert Python code into high-performance, memory-safe Rust. It offers features like automatic transpilation, memory safety guarantees, performance optimization, and testing & verification. The tool also supports AWS Lambda transpilation, aiming to reduce energy consumption and improve speed in cloud environments.
🔗 Links:
• View Project
================
🔓 Open Source
🚀 symbiote | Python
🎯 Primary Use Case:
Social engineering for capturing webcam images through phishing.
✨ Key Features:
• Phishing page creation
• Webcam image capture
• Tunnelling options (Ngrok, Localhost.run, LocalXpose)
• Installation script for Kali Linux/Termux
📖 Summary:
Symbiote is a social engineering tool designed to create phishing pages that request camera permissions, allowing for covert webcam image capture. It provides tunnelling options like Ngrok and LocalXpose and includes an installation script for Kali Linux and Termux. The tool is intended for educational purposes only.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Social engineering for capturing webcam images through phishing.
✨ Key Features:
• Phishing page creation
• Webcam image capture
• Tunnelling options (Ngrok, Localhost.run, LocalXpose)
• Installation script for Kali Linux/Termux
📖 Summary:
Symbiote is a social engineering tool designed to create phishing pages that request camera permissions, allowing for covert webcam image capture. It provides tunnelling options like Ngrok and LocalXpose and includes an installation script for Kali Linux and Termux. The tool is intended for educational purposes only.
🔗 Links:
• View Project
================
🔓 Open Source
🌟 pgassistant | CSS
🎯 Primary Use Case:
Understanding and optimizing PostgreSQL database performance.
✨ Key Features:
• Database Behavior Analysis
• Schema Optimization
• Query Library Management
• SQL Code Linting
• OpenAI helper for query plan understanding and optimization
📖 Summary:
PgAssistant is an open-source tool designed to help developers understand and optimize their PostgreSQL database performance. It provides features such as database behavior analysis, schema optimization, query library management, and integration with LLMs for advanced query analysis and optimization. The tool also offers features like PGTune integration, Docker-compose generation, and RFC compliance checks.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Understanding and optimizing PostgreSQL database performance.
✨ Key Features:
• Database Behavior Analysis
• Schema Optimization
• Query Library Management
• SQL Code Linting
• OpenAI helper for query plan understanding and optimization
📖 Summary:
PgAssistant is an open-source tool designed to help developers understand and optimize their PostgreSQL database performance. It provides features such as database behavior analysis, schema optimization, query library management, and integration with LLMs for advanced query analysis and optimization. The tool also offers features like PGTune integration, Docker-compose generation, and RFC compliance checks.
🔗 Links:
• View Project
================
🔓 Open Source
✨ tracecat | Python
🎯 Primary Use Case:
Security and IT automation
✨ Key Features:
• Workflow automation
• Integration templates
• No-code UI
• Lookup tables
• Case management
📖 Summary:
Tracecat is an open-source automation platform designed for security and IT teams. It provides tools for workflow automation, integration via templates, and case management. The platform utilizes a no-code UI and is orchestrated using Temporal for scalability and reliability.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🎯 Primary Use Case:
Security and IT automation
✨ Key Features:
• Workflow automation
• Integration templates
• No-code UI
• Lookup tables
• Case management
📖 Summary:
Tracecat is an open-source automation platform designed for security and IT teams. It provides tools for workflow automation, integration via templates, and case management. The platform utilizes a no-code UI and is orchestrated using Temporal for scalability and reliability.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🔥 Th3inspector | Perl
🎯 Primary Use Case:
Information Gathering
✨ Key Features:
• Website Information Gathering
• Phone Number Information Gathering
• MX Record Lookup
• WHOIS Lookup
• Geolocation
📖 Summary:
Th3inspector is a Perl-based information gathering tool. It consolidates various lookup functionalities such as WHOIS, geolocation, MX records, and subdomain scanning into a single tool. It also includes features like Cloudflare bypass and credit card BIN checking.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Information Gathering
✨ Key Features:
• Website Information Gathering
• Phone Number Information Gathering
• MX Record Lookup
• WHOIS Lookup
• Geolocation
📖 Summary:
Th3inspector is a Perl-based information gathering tool. It consolidates various lookup functionalities such as WHOIS, geolocation, MX records, and subdomain scanning into a single tool. It also includes features like Cloudflare bypass and credit card BIN checking.
🔗 Links:
• View Project
================
🔓 Open Source
🔥 ip-nose | C++
🎯 Primary Use Case:
IP geolocation and information retrieval from the command line.
✨ Key Features:
• IP Geolocation
• IP Detection
• Matrix-themed Interface
• Search History
• Customizable Configuration
📖 Summary:
ip-nose is a C++ command-line tool for IP geolocation, providing detailed information about IP addresses. It features a unique Matrix-inspired interface, IP detection, search history, and customizable settings. It is designed for developers and network enthusiasts seeking a stylish and efficient IP geolocation solution.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🎯 Primary Use Case:
IP geolocation and information retrieval from the command line.
✨ Key Features:
• IP Geolocation
• IP Detection
• Matrix-themed Interface
• Search History
• Customizable Configuration
📖 Summary:
ip-nose is a C++ command-line tool for IP geolocation, providing detailed information about IP addresses. It features a unique Matrix-inspired interface, IP detection, search history, and customizable settings. It is designed for developers and network enthusiasts seeking a stylish and efficient IP geolocation solution.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🌟 munal-os | Rust
🎯 Primary Use Case:
An experimental operating system for exploring OS design principles and WASM sandboxing.
✨ Key Features:
• Unikernel design
• Cooperative scheduling
• WASM sandboxing for security
• Graphical interface with mouse and keyboard support
• Network driver and TCP stack
📖 Summary:
Munal OS is an experimental, Rust-based operating system employing a unikernel architecture and cooperative scheduling. It leverages WASM sandboxing to provide a secure environment for applications. The OS features a graphical interface, network stack, UI toolkit, and embedded applications, primarily using VirtIO drivers and avoiding traditional OS components like bootloaders and interrupts for simplicity.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
An experimental operating system for exploring OS design principles and WASM sandboxing.
✨ Key Features:
• Unikernel design
• Cooperative scheduling
• WASM sandboxing for security
• Graphical interface with mouse and keyboard support
• Network driver and TCP stack
📖 Summary:
Munal OS is an experimental, Rust-based operating system employing a unikernel architecture and cooperative scheduling. It leverages WASM sandboxing to provide a secure environment for applications. The OS features a graphical interface, network stack, UI toolkit, and embedded applications, primarily using VirtIO drivers and avoiding traditional OS components like bootloaders and interrupts for simplicity.
🔗 Links:
• View Project
================
🔓 Open Source
💡 cariddi | Go
🎯 Primary Use Case:
Security scanning and reconnaissance of web applications to identify potential vulnerabilities and sensitive information exposure.
✨ Key Features:
• Crawls URLs from a list of domains
• Scans for endpoints, secrets, API keys, file extensions, and tokens
📖 Summary:
Cariddi is a Go-based tool designed for comprehensive web application reconnaissance. It crawls specified domains, identifies endpoints, and scans for sensitive information like secrets, API keys, and file extensions. The tool offers various scan options, supports multiple installation methods, and allows for customized configurations, making it suitable for security professionals and bug bounty hunters.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🎯 Primary Use Case:
Security scanning and reconnaissance of web applications to identify potential vulnerabilities and sensitive information exposure.
✨ Key Features:
• Crawls URLs from a list of domains
• Scans for endpoints, secrets, API keys, file extensions, and tokens
📖 Summary:
Cariddi is a Go-based tool designed for comprehensive web application reconnaissance. It crawls specified domains, identifies endpoints, and scans for sensitive information like secrets, API keys, and file extensions. The tool offers various scan options, supports multiple installation methods, and allows for customized configurations, making it suitable for security professionals and bug bounty hunters.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
💡 waypoint | Go
🎯 Primary Use Case:
Creating and managing custom URL shorteners for internal tools, documentation, or any web resources.
✨ Key Features:
• Human-readable Shortcuts
• Hierarchical Organization
• Real-time Updates
• Flexible Deployment
• Multiple Access Methods
📖 Summary:
WayPoint is a fast, lightweight URL mapping and redirection system that dynamically manages URL shortcuts through YAML configuration files. It offers features like human-readable shortcuts, hierarchical organization, real-time updates, and flexible deployment options. WayPoint can be used as a server for web access or integrated with the shell for command-line usage, making it ideal for creating and managing custom URL shorteners.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Creating and managing custom URL shorteners for internal tools, documentation, or any web resources.
✨ Key Features:
• Human-readable Shortcuts
• Hierarchical Organization
• Real-time Updates
• Flexible Deployment
• Multiple Access Methods
📖 Summary:
WayPoint is a fast, lightweight URL mapping and redirection system that dynamically manages URL shortcuts through YAML configuration files. It offers features like human-readable shortcuts, hierarchical organization, real-time updates, and flexible deployment options. WayPoint can be used as a server for web access or integrated with the shell for command-line usage, making it ideal for creating and managing custom URL shorteners.
🔗 Links:
• View Project
================
🔓 Open Source
🌟 minecraft-building-assistance-game | Python
🎯 Primary Use Case:
Research and development of AI assistants for complex building tasks in Minecraft.
✨ Key Features:
• Minecraft Building Assistance Game (MBAG) environment
• AssistanceZero training for AI assistants
📖 Summary:
This repository provides the Minecraft Building Assistance Game (MBAG) environment for studying complex assistance games. It includes the implementation of AssistanceZero for training AI assistants and allows integration with Minecraft via Project Malmo. The repository also provides a house dataset for training and evaluation, enabling researchers to develop and test AI agents capable of assisting human players in building tasks within Minecraft.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Research and development of AI assistants for complex building tasks in Minecraft.
✨ Key Features:
• Minecraft Building Assistance Game (MBAG) environment
• AssistanceZero training for AI assistants
📖 Summary:
This repository provides the Minecraft Building Assistance Game (MBAG) environment for studying complex assistance games. It includes the implementation of AssistanceZero for training AI assistants and allows integration with Minecraft via Project Malmo. The repository also provides a house dataset for training and evaluation, enabling researchers to develop and test AI agents capable of assisting human players in building tasks within Minecraft.
🔗 Links:
• View Project
================
🔓 Open Source
🚀 Prompt2Flutter | TypeScript
🎯 Primary Use Case:
Transforming text descriptions into Flutter applications
✨ Key Features:
• Convert natural language descriptions into Flutter code
• Create complete Flutter projects with proper structure
• Manage Flutter dependencies automatically
• Generate UI components and app logic
• Support for Flutter best practices and patterns
📖 Summary:
Prompt2Flutter is a proof-of-concept project that uses AI, specifically Google's Gemini model, to convert natural language descriptions into fully functional Flutter applications. It aims to automate the process of Flutter app development by generating code, managing dependencies, and creating UI components based on user input.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🎯 Primary Use Case:
Transforming text descriptions into Flutter applications
✨ Key Features:
• Convert natural language descriptions into Flutter code
• Create complete Flutter projects with proper structure
• Manage Flutter dependencies automatically
• Generate UI components and app logic
• Support for Flutter best practices and patterns
📖 Summary:
Prompt2Flutter is a proof-of-concept project that uses AI, specifically Google's Gemini model, to convert natural language descriptions into fully functional Flutter applications. It aims to automate the process of Flutter app development by generating code, managing dependencies, and creating UI components based on user input.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
💡 napkins | TypeScript
🎯 Primary Use Case:
Generating applications from wireframes.
✨ Key Features:
• Wireframe to app generation
• Powered by Llama 4 and Together.ai
• Code sandbox using Sandpack
• Image storage using S3
• Next.js app router with Tailwind CSS
📖 Summary:
The napkins.dev repository provides an open-source wireframe-to-app generator. It leverages Llama 4 and Together.ai for LLM inference, Sandpack for a code sandbox environment, and S3 for image storage. The application is built using Next.js with Tailwind CSS, and incorporates Helicone for observability and Plausible for website analytics.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🎯 Primary Use Case:
Generating applications from wireframes.
✨ Key Features:
• Wireframe to app generation
• Powered by Llama 4 and Together.ai
• Code sandbox using Sandpack
• Image storage using S3
• Next.js app router with Tailwind CSS
📖 Summary:
The napkins.dev repository provides an open-source wireframe-to-app generator. It leverages Llama 4 and Together.ai for LLM inference, Sandpack for a code sandbox environment, and S3 for image storage. The application is built using Next.js with Tailwind CSS, and incorporates Helicone for observability and Plausible for website analytics.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
✨ wazuh | C
🎯 Primary Use Case:
Threat prevention, detection, and response across various environments (on-premises, virtualized, containerized, and cloud-based).
✨ Key Features:
• Intrusion detection
• Log data analysis
• File integrity monitoring
• Vulnerability detection
• Configuration assessment
📖 Summary:
Wazuh is an open-source security platform that provides XDR and SIEM capabilities. It uses agents to collect data from endpoints, which is then analyzed by a central server. Wazuh integrates with the Elastic Stack for data visualization and offers features like intrusion detection, log analysis, file integrity monitoring, vulnerability detection, configuration assessment, and incident response.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🎯 Primary Use Case:
Threat prevention, detection, and response across various environments (on-premises, virtualized, containerized, and cloud-based).
✨ Key Features:
• Intrusion detection
• Log data analysis
• File integrity monitoring
• Vulnerability detection
• Configuration assessment
📖 Summary:
Wazuh is an open-source security platform that provides XDR and SIEM capabilities. It uses agents to collect data from endpoints, which is then analyzed by a central server. Wazuh integrates with the Elastic Stack for data visualization and offers features like intrusion detection, log analysis, file integrity monitoring, vulnerability detection, configuration assessment, and incident response.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🌟 vicut | Rust
🎯 Primary Use Case:
Extracting and manipulating text data from files or standard input using Vim commands in a command-line environment.
✨ Key Features:
• Apply Vim-style editing commands to files or stdin.
• Output in plain text, JSON, or using a format string.
• Chain multiple editing/extraction commands.
• Multi-threaded stream-style processing.
• In-place file editing.
📖 Summary:
Vicut is a command-line text editor that leverages Vim's powerful editing capabilities for non-interactive text processing. It allows users to apply Vim commands to files or standard input, extract specific fields, and format the output as plain text, JSON, or custom templates. Vicut combines the expressiveness of Vim with the utility of command-line tools like sed and awk.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Extracting and manipulating text data from files or standard input using Vim commands in a command-line environment.
✨ Key Features:
• Apply Vim-style editing commands to files or stdin.
• Output in plain text, JSON, or using a format string.
• Chain multiple editing/extraction commands.
• Multi-threaded stream-style processing.
• In-place file editing.
📖 Summary:
Vicut is a command-line text editor that leverages Vim's powerful editing capabilities for non-interactive text processing. It allows users to apply Vim commands to files or standard input, extract specific fields, and format the output as plain text, JSON, or custom templates. Vicut combines the expressiveness of Vim with the utility of command-line tools like sed and awk.
🔗 Links:
• View Project
================
🔓 Open Source
🚀 dohot | Shell
🎯 Primary Use Case:
Improving privacy by using DNS over HTTPS over Tor.
✨ Key Features:
• Explanation of DNS over HTTPS over Tor
• Encouragement of adoption of DNS over HTTPS over Tor
• Simplification of adoption of DNS over HTTPS over Tor
📖 Summary:
The DoHoT project aims to promote and simplify the adoption of DNS over HTTPS over Tor for enhanced privacy. It provides resources and documentation to help users understand and implement this technology, addressing privacy concerns related to traditional DNS protocols. The project emphasizes the benefits of combining DoH and Tor to circumvent surveillance and interference with DNS queries.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Improving privacy by using DNS over HTTPS over Tor.
✨ Key Features:
• Explanation of DNS over HTTPS over Tor
• Encouragement of adoption of DNS over HTTPS over Tor
• Simplification of adoption of DNS over HTTPS over Tor
📖 Summary:
The DoHoT project aims to promote and simplify the adoption of DNS over HTTPS over Tor for enhanced privacy. It provides resources and documentation to help users understand and implement this technology, addressing privacy concerns related to traditional DNS protocols. The project emphasizes the benefits of combining DoH and Tor to circumvent surveillance and interference with DNS queries.
🔗 Links:
• View Project
================
🔓 Open Source
🔥 TxtNet-Browser | Java
🎯 Primary Use Case:
Browsing the web over SMS without a mobile data connection.
✨ Key Features:
• Browse the web over SMS
• No WiFi or mobile data required
• Uses Brotli compression
• Custom Base-114 encoding
• Removes media content, JavaScript, and CSS
📖 Summary:
TxtNet Browser is an Android app that enables web browsing via SMS, eliminating the need for WiFi or mobile data. It utilizes Brotli compression and a custom encoding format to transmit web content. The app also features a built-in server hosting option, allowing users to act as server hosts and facilitate distributed communication.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Browsing the web over SMS without a mobile data connection.
✨ Key Features:
• Browse the web over SMS
• No WiFi or mobile data required
• Uses Brotli compression
• Custom Base-114 encoding
• Removes media content, JavaScript, and CSS
📖 Summary:
TxtNet Browser is an Android app that enables web browsing via SMS, eliminating the need for WiFi or mobile data. It utilizes Brotli compression and a custom encoding format to transmit web content. The app also features a built-in server hosting option, allowing users to act as server hosts and facilitate distributed communication.
🔗 Links:
• View Project
================
🔓 Open Source
🌟 winutil | PowerShell
🎯 Primary Use Case:
Streamlining Windows system configuration, maintenance, and software installation.
✨ Key Features:
• Installs programs
• Debloats with tweaks
• Troubleshoots with config
• Fixes Windows updates
📖 Summary:
Winutil is a PowerShell utility designed to automate and simplify common Windows tasks. It focuses on installing software, debloating unnecessary features, troubleshooting system configurations, and resolving Windows update issues. The utility aims to provide a streamlined and efficient way to maintain and optimize Windows systems.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Streamlining Windows system configuration, maintenance, and software installation.
✨ Key Features:
• Installs programs
• Debloats with tweaks
• Troubleshoots with config
• Fixes Windows updates
📖 Summary:
Winutil is a PowerShell utility designed to automate and simplify common Windows tasks. It focuses on installing software, debloating unnecessary features, troubleshooting system configurations, and resolving Windows update issues. The utility aims to provide a streamlined and efficient way to maintain and optimize Windows systems.
🔗 Links:
• View Project
================
🔓 Open Source
✨ BongoCat | TypeScript
🎯 Primary Use Case:
Adding a fun, interactive desktop pet (BongoCat) to enhance user experience across different operating systems.
✨ Key Features:
• Cross-platform support (Windows, macOS, Linux)
• Desktop pet application
• Inspired by Bongo-Cat-Mver
📖 Summary:
BongoCat is a cross-platform desktop pet application that brings the popular Bongo Cat character to Windows, macOS, and Linux. Inspired by Bongo-Cat-Mver, it allows users to have an interactive cat animation on their desktop, adding a touch of fun and personality to their computing experience. The application is built using TypeScript and Tauri, ensuring compatibility across multiple platforms.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🎯 Primary Use Case:
Adding a fun, interactive desktop pet (BongoCat) to enhance user experience across different operating systems.
✨ Key Features:
• Cross-platform support (Windows, macOS, Linux)
• Desktop pet application
• Inspired by Bongo-Cat-Mver
📖 Summary:
BongoCat is a cross-platform desktop pet application that brings the popular Bongo Cat character to Windows, macOS, and Linux. Inspired by Bongo-Cat-Mver, it allows users to have an interactive cat animation on their desktop, adding a touch of fun and personality to their computing experience. The application is built using TypeScript and Tauri, ensuring compatibility across multiple platforms.
🔗 Links:
• View Project
• Homepage
================
🔓 Open Source
🌟 dead-man-hand | Go
🎯 Primary Use Case:
Executing predefined actions when the user is no longer available, ensuring privacy and confidentiality of those actions until that time.
✨ Key Features:
• Privacy focused action execution
• Encryption of actions using age
• Integration with Vault for key management
• Multiple action execution methods (json_post, bulksms, mail)
• High test coverage
📖 Summary:
The dead-man-hand repository provides a privacy-focused dead man's switch software. It allows users to define actions that will be executed when they are no longer available, ensuring that these actions remain confidential until that specific time. The system uses encryption and integrates with Vault for secure key management, supporting multiple action execution methods.
🔗 Links:
• View Project
================
🔓 Open Source
🎯 Primary Use Case:
Executing predefined actions when the user is no longer available, ensuring privacy and confidentiality of those actions until that time.
✨ Key Features:
• Privacy focused action execution
• Encryption of actions using age
• Integration with Vault for key management
• Multiple action execution methods (json_post, bulksms, mail)
• High test coverage
📖 Summary:
The dead-man-hand repository provides a privacy-focused dead man's switch software. It allows users to define actions that will be executed when they are no longer available, ensuring that these actions remain confidential until that specific time. The system uses encryption and integrates with Vault for secure key management, supporting multiple action execution methods.
🔗 Links:
• View Project
================
🔓 Open Source