Cryptolog is a tool for anonymizing webserver logs.
☆70Jul 28, 2016Updated 9 years ago
Alternatives and similar repositories for cryptolog
Users that are interested in cryptolog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆63May 22, 2014Updated 11 years ago
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- duraconf - A collection of hardened configuration files for SSL/TLS services☆17Jun 13, 2020Updated 5 years ago
- A ruby gem for creating secure passphrases using EFF's long wordlist.☆11Apr 20, 2018Updated 8 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Security Education Companion☆39Jan 25, 2023Updated 3 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Oct 30, 2024Updated last year
- a simple server that connects calls between citizens and their congress person using the Twilio API☆38Mar 3, 2025Updated last year
- How to Implement DNT☆142Dec 8, 2017Updated 8 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- 💵 Search for WooCommerce orders in the admin at the speed of thought with Algolia.☆21Dec 6, 2022Updated 3 years ago
- Self-contained uLisp computer using Teensy 4.1 and TFT with RA8875 controller☆19Feb 4, 2026Updated 2 months ago
- Axis (VAPIX) camera control in Node☆14Nov 5, 2015Updated 10 years ago
- My Privoxy configuration files☆27Apr 15, 2012Updated 14 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Materials and slides for talks I've given in the past☆14Feb 20, 2026Updated 2 months ago
- Build projects required for OMI (Open Management Infrastructure)☆26Jun 17, 2025Updated 10 months ago
- standard configuration for ssb☆23Oct 16, 2021Updated 4 years ago
- ☆10Dec 23, 2014Updated 11 years ago
- An application that helps you notify your friends and/or family if you've gone missing.☆11Jan 28, 2017Updated 9 years ago
- Protest organizing application☆67Oct 18, 2019Updated 6 years ago
- GitLab as a Sandstorm app☆20Jun 10, 2017Updated 8 years ago
- ☆26Jun 20, 2018Updated 7 years ago
- The sidechain pegging gateway that can be used to link Openchain with another chain.☆17Feb 12, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PowerShell module for managing WebJEA configs☆15Sep 25, 2021Updated 4 years ago
- A system for ensuring & authenticating STARTTLS encryption between mail servers☆366May 20, 2020Updated 5 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated last year
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago
- Yubico reference authentication software stack. This package installs and configures various packages contained in the YubiX stack.☆30Dec 6, 2018Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Copy a floppy/hard drive from one computer to another via a serial null modem connection☆15Sep 16, 2023Updated 2 years ago
- Ansible role for Docker installation on a Raspberry Pi☆16Jan 13, 2019Updated 7 years ago
- Use Redis to handle Apache URL rewriting.☆15May 13, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Header-only arena allocator implementation in C.☆15Feb 3, 2025Updated last year
- Go implementation of the HTTP-to-IPFS gateway -- currently lives in go-ipfs☆17Jul 21, 2022Updated 3 years ago
- HCL reports for Qubes OS Project☆14Jun 22, 2025Updated 10 months ago
- Satellite: Measuring The Internet's Stars☆39Sep 2, 2020Updated 5 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago