ProjectVault / orp
☆419Updated 9 years ago
Alternatives and similar repositories for orp:
Users that are interested in orp are comparing it to the libraries listed below
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- Double Ratchet Algorithm☆376Updated 8 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆433Updated 6 years ago
- ☆88Updated 9 years ago
- SUIDGuard - a TrustedBSD Kernel Extension that adds mitigations to protect SUID/SGID processes a bit more☆391Updated 8 years ago
- ☆781Updated 6 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- An open source miniPCIe development board based on the Xilinx Spartan 6 LX150T☆143Updated 9 years ago
- INTERLOCK - file encryption and HSM front-end☆299Updated 2 weeks ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- A set of scripts to root and install gapps and orbot+orwall into a CopperheadOS image and re-sign it for verified boot.☆223Updated 7 years ago
- Pond☆911Updated 3 years ago
- Open Database of Firmware Test Results☆150Updated 8 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆807Updated 8 years ago
- Next-generation bcrypt, scrypt, pbkdf2☆114Updated 9 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago
- ACME Specification☆1,133Updated 9 months ago
- ZeroDB server and client-side example of using it☆135Updated 8 years ago
- Noise Specification☆450Updated 6 years ago
- search key to restore petya encrypted mft☆614Updated 8 years ago
- THIS PROJECT IS DEPRECATED☆62Updated 8 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆506Updated 3 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 7 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 9 years ago
- Repository for all Mitro client & server code☆1,641Updated 9 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- The USG is Good, not Bad☆404Updated 5 years ago
- Turn GNU command line tools into SaaS (Stupid Hackathon Project)☆510Updated 9 years ago