FiloSottile / sunlightLinks
A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.
☆246Updated last week
Alternatives and similar repositories for sunlight
Users that are interested in sunlight are comparing it to the libraries listed below
Sorting:
- A Go library for the Linux Landlock sandboxing feature☆202Updated 3 months ago
- WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade☆114Updated last week
- Go library for building tile-based transparency logs (tlogs)☆87Updated this week
- A Go implementation of the quantum-resistant key encapsulation method ML-KEM (formerly known as Kyber).☆150Updated 9 months ago
- Userspace TCP/IP Sockets For WireGuard.☆118Updated 10 months ago
- Package filippo.io/intermediates embeds a bundle of known unexpired, unrevoked intermediate certificates chaining to roots in the Mozilla…☆60Updated this week
- ☆26Updated 3 weeks ago
- Fly.io macaroon implementation☆94Updated 3 months ago
- Community Cryptography Specification Project☆423Updated last week
- SSH Certificate Authority with device attestation☆55Updated 11 months ago
- Go library for deriving age X25519 identities deterministically from keys or passwords.☆33Updated 6 months ago
- PKCS #11 modules in Go without cgo☆88Updated last year
- ☆107Updated 4 months ago
- ☆98Updated 3 months ago
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆19Updated 2 years ago
- A secrets management service that uses Tailscale for access control☆327Updated last week
- ☆28Updated 2 months ago
- A deterministic Bloom filter with support for saturation. Suitable for distributed use cases and as a cryptographic primitive.☆16Updated last year
- TPM 2.0 TSS keyfile library☆18Updated 2 months ago
- Package xaes256gcm implements the XAES-256-GCM extended-nonce AEAD.☆21Updated 11 months ago
- Zero-config service discovery for Tailscale networks☆109Updated 3 months ago
- HTTP proxy that injects 3rd party credentials into requests☆220Updated last month
- reference server for networkQuality/gorespsonsiveness☆70Updated last year
- SSH Agent for TKey, the flexible open hardware/software USB security key 🔑☆139Updated 2 weeks ago
- Go implementation of FOKS -- client and server☆331Updated this week
- mkctr: cross platform container builder for go☆91Updated 3 weeks ago
- Oblivious HTTP implementation☆31Updated last year
- The Balanced Routing Table is an adaptation of D. Knuth's ART algorithm and requires significantly less memory and has an even better loo…☆78Updated this week
- GitHub App to watch for PRs merged without a reviewer approving.☆125Updated 3 months ago
- ☆82Updated 2 months ago