Type: User
Bio: Rust Developer 🦀, {Arch Linux,Debian,Alpine} Package Maintainer 📦, Reproducible Builds Enthusiast ⛓, Security Researcher 🦝, Anarcho Communist 🏴
Twitter: kpcyrd
Location: Hamburg, Germany
Blog: https://vulns.xyz/
kpcyrd's Projects
4 to 6 server name indication hybrid destination network address translation
zone data for hamburgmesh.net
fancy html5 file upload, webrtc seeding swarm, auto torrent and scp interface
Build script to build Alpine packages (mirror)
Rust library for requesting certificates from an ACME provider
Tiny http daemon that answers acme challenges and redirects everything else to https
Build postprocessor to reset metadata fields for build reproducibility
Security advisory database for Rust crates published through crates.io
A cross-platform, GPU-accelerated terminal emulator
anewer appends lines from stdin to a file if they don't already exist in the file. This is a rust version of https://github.com/tomnomnom/anew
Super folder for git-annex drives
An ansible role to generate TLS certificates and get them signed by LetsEncrypt
Checklist of the most important security countermeasures when designing, testing, and releasing your API
Mirror of aports repository
🥸 p2p gossip network for update transparency, based on pgp 🥸
A utility like pkg-audit for Arch Linux. Based on Arch Security Team data.
Arch Linux Security Update Notifications
PKGBUILD files for Arch Linux packages
Arch Linux installer - guided, templates etc.
Lint repository of PKGBUILDs for cryptographically pinned inputs
Binary reproducible fork of the Arch Linux kernel package
Tools to reproduce arch linux packages
Scan the symbols of all ELF binaries in all Arch Linux packages for usage of malloc_usable_size (-D_FORTIFY_SOURCE=3 compatibility)
Forensic tool to read all installed packages from a mounted Arch Linux drive and compare the filesystem to a trusted source
Arch Linux website code
Hello World Rust firmware for digispark attiny85 microcontroller
Reproducible Builds for packages in the Arch User Repository (AUR)
Authenticate a tarball through a signed tag in a git repository (with reproducible builds)