Put files in Certificate Transparency logs and pull them back out
☆19Jun 3, 2019Updated 6 years ago
Alternatives and similar repositories for catlog
Users that are interested in catlog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This module detects HTTP requests that are non RFC compliant and used for smuggling☆12Mar 16, 2023Updated 3 years ago
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Nov 17, 2022Updated 3 years ago
- A Go library for MerkleSquare: A Low-Latency Transparency Log System☆23Apr 27, 2021Updated 4 years ago
- Automated generation of powerpoint slides for fun and profit☆13Oct 18, 2017Updated 8 years ago
- GNOME interface for USBGuard with the aim to be intuitive, informative and as low interaction as possible.☆13Jun 5, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Zeek package for detecting the Eternal* exploits and a set of SMBv1 protocol violations.☆19Aug 21, 2025Updated 7 months ago
- A forward-secure append-only persistent authenticated data structure☆16Jul 5, 2016Updated 9 years ago
- ☆15Mar 24, 2023Updated 3 years ago
- badsite.io is intended for manual testing of web security in clients and test tolos☆18May 18, 2018Updated 7 years ago
- `busybox` Docker image for multiple architectures☆12Jun 8, 2019Updated 6 years ago
- OpenPGP in Python using Sequoia PGP☆18Mar 18, 2026Updated last week
- An eMail newsletter privacy analysis framework☆11Jan 22, 2022Updated 4 years ago
- External tools IntelliJ plugin for the Elm programming language☆12Sep 18, 2018Updated 7 years ago
- Graph tool for sysadmins, with anomaly detection and redis backend.☆14May 5, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ROM Hack that adds support for playing CD quality music in Chrono Trigger using MSU-1. I also hope to play the FMV from the PS1 version.☆11Sep 27, 2016Updated 9 years ago
- FZF frontend for pass - Mirror of https://git.korhonen.cc/FunctionalHacker/fzf-pass☆10Aug 14, 2023Updated 2 years ago
- Signature-based Resource Loading Restrictions☆44Aug 13, 2025Updated 7 months ago
- USB man in the middle linux kernel driver☆21May 3, 2021Updated 4 years ago
- Libraries and tools for extracting Coq code to F#☆14Aug 16, 2013Updated 12 years ago
- ☆12Updated this week
- PoC of Swift for Compute@Edge☆12Feb 3, 2022Updated 4 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- Haskell RSA Library☆21Apr 18, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆20Jun 7, 2021Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- Experimental script to query rebuilderd for results☆14Dec 4, 2023Updated 2 years ago
- Laser cut + 3d printed air purifier case, our take on corsi-rosenthal☆22Feb 10, 2026Updated last month
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- 🚍 Home Assistant custom sensor for finding Czech Public Transportation Connections☆15Jun 1, 2022Updated 3 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Jul 15, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- generate pgp keys with vanity fingerprints☆18Dec 20, 2016Updated 9 years ago
- set dcf77 radio clocks through radio emissions of your display/monitor. my best hack ever.☆22Mar 26, 2018Updated 8 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆41Sep 2, 2025Updated 6 months ago
- 🔒 Remote signing☆26Nov 8, 2017Updated 8 years ago
- Hubs operate at layer one; switches operate at layer two.☆13Dec 12, 2015Updated 10 years ago
- drasyl-java is a high-performance framework for rapid development of distributed applications☆35Oct 27, 2025Updated 5 months ago
- Common MPC Pitfalls☆12Mar 16, 2026Updated last week