ProjectVault / orpLinks
☆418Updated 10 years ago
Alternatives and similar repositories for orp
Users that are interested in orp are comparing it to the libraries listed below
Sorting:
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- SUIDGuard - a TrustedBSD Kernel Extension that adds mitigations to protect SUID/SGID processes a bit more☆391Updated 9 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- The "Intel x86 considered harmful" paper☆197Updated 9 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 9 years ago
- ZeroDB server and client-side example of using it☆136Updated 8 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆307Updated 3 years ago
- Double Ratchet Algorithm☆377Updated 9 years ago
- The DIME resolver library and command line utilities.☆411Updated last year
- The USG is Good, not Bad☆404Updated 5 years ago
- ☆779Updated 7 years ago
- Pixel-perfect LastPass phishing☆337Updated 9 years ago
- Greybus subsystem repository☆120Updated 8 years ago
- INTERLOCK - file encryption and HSM front-end☆305Updated 3 months ago
- Pond☆913Updated 3 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- ☆89Updated 9 years ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- Memory-hard scheme Argon2☆204Updated 4 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆515Updated last month
- OZ: a sandboxing system targeting everyday workstation applications☆438Updated 7 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 8 years ago
- Open Database of Firmware Test Results☆150Updated 9 years ago
- ACME Specification☆1,129Updated last year
- xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time | poc or gtfo☆395Updated 9 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆807Updated 8 years ago