DrWhax / mpOTRLinks
Our aim is to build a multi-party 'off the record' messaging plugin for various clients.
☆34Updated 11 years ago
Alternatives and similar repositories for mpOTR
Users that are interested in mpOTR are comparing it to the libraries listed below
Sorting:
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- Stochastic Traffic Factoring Utility☆15Updated 9 years ago
- Crypto scanner☆43Updated 14 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- python tor client☆27Updated 10 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- opmsg p2p transport network☆75Updated 7 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Threatbutt Suite☆37Updated 10 years ago
- stream encoding toolkit☆54Updated 9 years ago
- free crypto audit☆31Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- lte security☆42Updated 10 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- A Camouflage Proxy for the Tor Anonymity System☆87Updated 10 years ago
- This is where we work on the newsletter☆28Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Mass DNS resolution tool☆37Updated last week
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago