Recent Projects

romanofski/purebred

Development builds for purebred, a mail user agent (MUA) build around notmuch.
  • Fedora 40 : x86_64
  • Fedora 41 : x86_64
  • Fedora 42 : x86_64
  • Fedora rawhide : x86_64

smokedcheese/toxcore

Description not filled in by author. Very likely personal repository for testing purpose, which you should not use.
  • EPEL 7 : x86_64
  • Fedora 40 : i386, x86_64
  • Fedora 41 : i386, x86_64
  • Fedora 42 : i386, x86_64
  • Fedora rawhide : i386, x86_64

@appuio/gluster

Description not filled in by author. Very likely personal repository for testing purpose, which you should not use.
  • EPEL 7 : x86_64

bentoo/llvm-5.0.0

Description not filled in by author. Very likely personal repository for testing purpose, which you should not use.

sassmann/kernel-tpt10

Description not filled in by author. Very likely personal repository for testing purpose, which you should not use.

baptu/xcrysden

Description not filled in by author. Very likely personal repository for testing purpose, which you should not use.

baptu/grace

Grace is a WYSIWYG 2D plotting tool for the X Window System and Mtif. Grace runs on practically any version of Unix-like OS. As well, it has been successfully ported to VMS, OS/2, and Win9/NT/2000/XP (some minor functionality may be missing, though).

ikurniawan/RfCat

Welcome to the rfcat project The swiss army knife of subGHz RfCat allows you to control the wireless transceiver from an interactive Python shell or your own program running on your computer. GOALS The goals of the project are to reduce the time for security researchers to create needed tools for analyzing unknown targets, to aid in reverse-engineering of hardware, and to satiate my rf lust. Using rfcat If you have configured your system to allow non-root use: type "rfcat -r" (if your system is not configured to allow non-root use, prepend "sudo" or you must run as root) you should have now entered an interactive python shell, where tab-completion and other aids should make a very powerful experience i love the raw-byte handling and introspection of it all. try things like: d.ping() d.discover() d.debug() d.RFxmit('blahblahblah') d.RFrecv() print(d.reprRadioConfig()) d.setMdmDRate(19200) # this sets the modem baud rate (or DataRate) d.setPktPQT(0) # this sets the preamble quality threshold to 0 d.setEnableMdmFEC(True) # enables the convolutional Forward Error Correction built into the radio while the toolset was created to make communicating with <ghz much easier, you will find the cc1111 manual from ti a great value. the better you understand the radio, the better your experience will be. play with the radio settings, but i recommend playing in small amounts and watch for the effects. several things in the radio configuration settings are mandatory to get right in order to receive or transmit anything (one of those odd requirements is the TEST2/1/0 registers!) If you watched any of my talks on rfcat, you will likely remember that you need to put the radio in IDLE state before configuring. (I said it three times, in a row, in different inflections). However, you will find that I've done that for you in the client for most things. The only time you need to do this yourself are: * If you are doing the changes in firmware * If you are using the "d.poke()" functionality * if you use "d.setRFRegister()", this is handled for you * use d.setRFRegister() External Projects ZWave Attack: https://github.com/initbrain/Z-Attack Epilogue Other than that, hack fun, and feel free to share any details you can about successes and questions about failures you are able! @ and the rest of the development team.
  • Fedora 40 : x86_64

carlwgeorge/drone

WARNING: Upstream has made major licensing changes in 1.0.0. This repository is still on 0.8.x and will not be updated to 1.0.0. It is effectively deprecated. Drone is a continuous delivery system built on container technology. Drone uses a simple YAML configuration file, a superset of docker-compose, to define and execute pipelines inside Docker containers. drone (server and agent) spec file drone cli spec file
  • EPEL 7 : x86_64

trevors/extras

Description not filled in by author. Very likely personal repository for testing purpose, which you should not use.
  • Centos-stream 9 : x86_64
  • EPEL 9 : x86_64