FauxFaux / truecryptLinks
TrueCrypt from source archives
☆82Updated 10 years ago
Alternatives and similar repositories for truecrypt
Users that are interested in truecrypt are comparing it to the libraries listed below
Sorting:
- Encrypted Text Messaging☆148Updated 10 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 11 years ago
- DiskCryptor - Open source partition encryption solution☆42Updated 12 years ago
- OBSOLETE. Merged into ubiquitous_bash with both MSW and UNIX guest support. Virtualization wrapper to open Linux files in fresh MS-Window…☆104Updated 13 years ago
- Decryption Tool☆147Updated 6 years ago
- rasta ring 0 debugger☆77Updated 17 years ago
- Analysis of the Skype VoIP client☆66Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆29Updated 11 years ago
- Collection of scripts that were once useful for reverse engineering things☆75Updated 15 years ago
- A OS X crypto ransomware PoC☆89Updated 10 years ago
- Official implementation of the VirusTotal API in C programming language☆113Updated 2 years ago
- You'll never take me alive.☆85Updated 11 years ago
- An EFI image parser and dissector☆52Updated 12 years ago
- ☆25Updated 10 years ago
- A USB layer firewall for the Linux kernel☆37Updated 7 years ago
- Fast TCP encryption☆214Updated 3 years ago
- A tool for securing communications between a client and a DNS resolver☆21Updated 10 years ago
- ☆23Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Updated 9 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- An advanced memory forensics framework☆25Updated 11 years ago
- DEPRECATED - replaced with "monitor"☆123Updated 10 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 12 years ago
- An implementation of the Salsa20 stream cipher in C99☆117Updated 9 years ago
- Crypto scanner☆43Updated 14 years ago
- Yubico C client library☆86Updated 4 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- Slides from presentations done by ESET researchers☆20Updated 10 years ago