ProjectVault / orpLinks
☆418Updated 10 years ago
Alternatives and similar repositories for orp
Users that are interested in orp are comparing it to the libraries listed below
Sorting:
- Use OpenPGP-based encryption in Yahoo mail.☆222Updated 9 years ago
- Double Ratchet Algorithm☆375Updated 9 years ago
- Deprecated - MIG Memory Forensic library☆384Updated 4 years ago
- Pixel-perfect LastPass phishing☆336Updated 10 years ago
- The USG is Good, not Bad☆402Updated 6 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆311Updated 4 years ago
- SUIDGuard - a TrustedBSD Kernel Extension that adds mitigations to protect SUID/SGID processes a bit more☆392Updated 9 years ago
- ZeroDB server and client-side example of using it☆136Updated 9 years ago
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 10 years ago
- INTERLOCK - file encryption and HSM front-end☆305Updated 2 months ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆321Updated 8 years ago
- The DIME resolver library and command line utilities.☆410Updated 2 years ago
- Memory-hard scheme Argon2☆207Updated 5 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Pond☆920Updated 4 years ago
- Provably Anonymous Overlay☆325Updated 11 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆522Updated 7 months ago
- Greybus subsystem repository☆120Updated 9 years ago
- Noise Specification☆460Updated 7 years ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- All the Open Source Software provided by BMW for their i3☆607Updated 9 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆805Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- ☆89Updated 9 years ago
- A public database for software and firmware hashes☆215Updated 9 years ago
- Full network stack over sound -- lwIP driver for libquiet☆665Updated 6 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- ☆288Updated 9 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago