Initializes new chroot file systems compatible with Firejail sandboxing utility
-
Updated
Jun 3, 2021 - Shell
Initializes new chroot file systems compatible with Firejail sandboxing utility
Quick and dirty script I wrote to check which apps I can jail using firejail
An online judge system.
my gnu/linux dotfiles for fvwm, firejail, emacs, neovim, x11, and more
Ansible role for installing and updating multiple versions of Firefox and configuring Firejail on Debian and Ubuntu.
Search and watch youtube videos by just runing this simple bash script
MIGRATED TO https://vcs.rowanthorpe.com/rowan/jailrun - THIS IS AN ARCHIVED VERSION... Run a firejailed graphical application, inside an optional firejailed desktop environment (window manager, panel, systray) inside a firejailed per-environment Xephyr Xserver instance.
Merged to firejail; Find syscalls of executables for seccomp-bpf sandbox policies.
Add a description, image, and links to the firejail topic page so that developers can more easily learn about it.
To associate your repository with the firejail topic, visit your repo's landing page and select "manage topics."