AGProjects / python3-otrLinks
Off-The-Record Messaging protocol implementation for Python
☆14Updated 10 months ago
Alternatives and similar repositories for python3-otr
Users that are interested in python3-otr are comparing it to the libraries listed below
Sorting:
- 🥸 Experimental p2p gossip network for OpenPGP signature transparency 🥸☆35Updated 3 weeks ago
- quotes i like.☆16Updated 6 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 8 months ago
- Bruteforce with a stream of permutations of a specific pattern☆26Updated 6 months ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Updated 10 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Android App that genereates passcode authentication codes for Postfinance cards☆12Updated 3 years ago
- Browser extension that complements the PhishDetect service☆24Updated 3 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- Geolocate your files!☆16Updated 4 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- QubesOS dom0 automation in Python☆12Updated 8 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- Web of trust grapher☆39Updated 7 months ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Updated 6 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆35Updated 3 months ago
- degoogle for your browser☆18Updated 4 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- tamper resistant audit log☆17Updated 7 years ago
- ☆12Updated 5 years ago
- ☆24Updated last year
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 6 years ago
- ☆31Updated 5 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 7 years ago
- Off-The-Record Messaging protocol implementation for Python☆22Updated 5 years ago
- EME (Encrypt-Mix-Encrypt) wide-block encryption for Go.☆51Updated last week