FiloSottile / openbsd-fde-crack
Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL
☆59Updated 8 years ago
Alternatives and similar repositories for openbsd-fde-crack:
Users that are interested in openbsd-fde-crack are comparing it to the libraries listed below
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- Go HTTP Strict Transport Security library☆22Updated 5 months ago
- Various articles I've written☆115Updated last year
- Go seccomp parser and compiler☆53Updated 7 years ago
- ☆151Updated 10 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 8 years ago
- Chair and the Key☆65Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 8 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- Toolkit for multi-factor, multi-role encryption☆68Updated 9 years ago
- Replicating Encrypted PasteBin☆74Updated 7 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- uclibc build environment for predictable and repeatable building of binary packages☆56Updated 7 years ago
- DHCP as a FUSE file system☆52Updated 9 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- What I Learned from porting my projects to FreeBSD☆113Updated 4 months ago
- The "State considered harmful" paper☆105Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- The Macgyver of Dlopening: `dlopen` yourself!☆45Updated 8 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆102Updated 4 years ago
- encrypt and decrypt small files using OpenSSH keys☆70Updated 11 years ago