Step-by-step guide on how to create a GPG key on keybase.io, adding it to a local GPG setup and use it with Git and GitHub.

Setup Keybase.io, GPG & Git to sign commits on GitHub This is a step-by-step guide on how to create a GPG key on keybase.io, adding it to a local GPG setup and use it with Git and GitHub. Although this guide was written for

Related Repos



cyberstruggle Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.
 

fireeye capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate.
 

tina1998612 This is a list of security tools & commands that I have used or recommend. I'm using Kali Linux VM with a Windows host computer. Welcome any contributions! 💪
 

GurpreetKang Decrypts an encrypted Bitwarden data.json file (from the desktop App).You can safely store data.json as an encrypted, offline backup of your vault knowing you will always be able to decrypt it.
 

mubix IOXIDResolver.py from AirBus Security
 

april PicoCA is a simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used. It automatically generates both a key and a certificate when asked to produce a certificate
 

BetterWayElectronics A guide on implementing a secure Wireguard server on OVH with DNSCrypt, Port Knocking & an SSH-Honeypot
 

REgonLevy Shady Crypt is a new password hashing and cryptographically secure pseudo-random number generator (CSPRNG) library, optimized from the ground up to run natively on Node.js / the Chrome V8 JavaScript engine.