ChristopherA / revocable-self-signed-tls-certificates-hackView external linksLinks
As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demonstrate how we may be able to use similar approaches for more advanced capabilities that current X.509 infrastructure do not.
☆122May 19, 2015Updated 10 years ago
Alternatives and similar repositories for revocable-self-signed-tls-certificates-hack
Users that are interested in revocable-self-signed-tls-certificates-hack are comparing it to the libraries listed below
Sorting:
- Software for error-tolerant coding of information into DNA sequences using finite-state transducers.☆12Jan 8, 2017Updated 9 years ago
- a transparent filter for all of the various ways of sharing location☆10Apr 26, 2019Updated 6 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Generate strong passwords using /dev/urandom 👻☆15Aug 7, 2017Updated 8 years ago
- Very simple prototype of identity model☆15Oct 31, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- BSV Related Content Which Will Be Maintained On-Chain As Soon As Possible☆21Jun 4, 2019Updated 6 years ago
- A Bitcoin transaction broadcast service for paying for someone else's transaction.☆33Apr 14, 2019Updated 6 years ago
- Bitcoin network simulator☆19Jun 15, 2015Updated 10 years ago
- Bitcoin protocols made easy. Documentation:☆19Feb 12, 2022Updated 4 years ago
- LEMS interpreter implemented in Python☆12Nov 26, 2025Updated 2 months ago
- A pure Golang webdav implement☆16Apr 6, 2014Updated 11 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Interactive IRC bot and logger in pure Bash☆16Dec 12, 2012Updated 13 years ago
- A dynamic compilation framework for PTX (forked from Google Code).☆10Jul 31, 2016Updated 9 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- A proof of concept to add real money P2P poker transactions to the popular pokerth texas holdem poker game☆10Nov 5, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- RWOT2 for the ID2020 UN Summit (May 2016)☆91Jul 9, 2022Updated 3 years ago
- A command line-based parameterized contracting tool☆46Sep 6, 2023Updated 2 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- ☆11Jun 14, 2018Updated 7 years ago
- ☆16Oct 10, 2016Updated 9 years ago
- A small (but hopefully growing) subset of the brl-cad primitives, being emitted as tcl scripts that mged can directly process into databa…☆10Dec 16, 2025Updated last month
- GPG encrypting MDA☆15May 25, 2025Updated 8 months ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Pursuance Project splash page☆12Mar 3, 2023Updated 2 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Presenters, titles & links☆10Apr 13, 2015Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- ☆26Jan 18, 2026Updated 3 weeks ago
- Zcash Vanity Address Generator☆24Aug 26, 2021Updated 4 years ago
- DEPRECATED: Use ghc-heap, ghc-heap-view in GHC 8.x instead.☆18Sep 17, 2016Updated 9 years ago
- A PE Header-Based Antivirus Tool☆11Nov 14, 2014Updated 11 years ago
- Legacy embed script for using TonicPow with your web applications☆12Apr 1, 2021Updated 4 years ago
- OmiseGO node on Tendermint.☆14Mar 27, 2018Updated 7 years ago