Exploring the magic of Bedrock Linux and making it as a powerhouse of portable development environment

Nixerizing our tools, nix-shells and nixos-containers for infosec community

A quick guide how to make your system easily reproducible with the magic of Nix and NixOS

New modules, functionalities and improvements

With a single script

Automating the process of decoy scanning and source spoofing