DrWhax / mpOTRLinks
Our aim is to build a multi-party 'off the record' messaging plugin for various clients.
☆34Updated 11 years ago
Alternatives and similar repositories for mpOTR
Users that are interested in mpOTR are comparing it to the libraries listed below
Sorting:
- Command-line utility to control Tor.☆89Updated last year
- python tor client☆27Updated 10 years ago
- opmsg p2p transport network☆73Updated 7 years ago
- stream encoding toolkit☆55Updated 9 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Passive DHCP fingerprinting implementation☆50Updated 9 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 9 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆80Updated 5 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Crypto scanner☆43Updated 14 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- Web of trust grapher☆38Updated 4 months ago
- ☆12Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- A Simple Network Stream Recorder☆35Updated 6 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆17Updated 9 years ago
- free crypto audit☆31Updated 8 years ago