ProjectVault / orpLinks
☆418Updated 10 years ago
Alternatives and similar repositories for orp
Users that are interested in orp are comparing it to the libraries listed below
Sorting:
- Use OpenPGP-based encryption in Yahoo mail.☆222Updated 9 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆309Updated 4 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 9 years ago
- Pixel-perfect LastPass phishing☆337Updated 9 years ago
- Memory-hard scheme Argon2☆207Updated 4 years ago
- Provably Anonymous Overlay☆324Updated 11 years ago
- Greybus subsystem repository☆120Updated 9 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Double Ratchet Algorithm☆376Updated 9 years ago
- The USG is Good, not Bad☆402Updated 5 years ago
- INTERLOCK - file encryption and HSM front-end☆304Updated 2 months ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆320Updated 8 years ago
- ACME Specification☆1,130Updated last year
- Pond☆916Updated 3 years ago
- ☆780Updated 7 years ago
- Noise Specification☆459Updated 7 years ago
- ☆89Updated 9 years ago
- An open source miniPCIe development board based on the Xilinx Spartan 6 LX150T☆145Updated 9 years ago
- ☆179Updated 9 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆517Updated 5 months ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- A public database for software and firmware hashes☆214Updated 9 years ago
- ZeroDB server and client-side example of using it☆136Updated 9 years ago
- As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demon…☆122Updated 10 years ago
- Quantum Insert☆214Updated 6 years ago
- All the Open Source Software provided by BMW for their i3☆602Updated 9 years ago
- Test DRAM for bit flips caused by the rowhammer problem☆983Updated 10 years ago