ProjectVault / orpLinks
☆418Updated 10 years ago
Alternatives and similar repositories for orp
Users that are interested in orp are comparing it to the libraries listed below
Sorting:
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆309Updated 3 years ago
- Deprecated - MIG Memory Forensic library☆385Updated 3 years ago
- SUIDGuard - a TrustedBSD Kernel Extension that adds mitigations to protect SUID/SGID processes a bit more☆392Updated 9 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 9 years ago
- Double Ratchet Algorithm☆378Updated 9 years ago
- The USG is Good, not Bad☆401Updated 5 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- Pond☆913Updated 3 years ago
- Provably Anonymous Overlay☆323Updated 10 years ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- Pixel-perfect LastPass phishing☆337Updated 9 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆805Updated 8 years ago
- ZeroDB server and client-side example of using it☆136Updated 9 years ago
- INTERLOCK - file encryption and HSM front-end☆304Updated 3 weeks ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- ☆779Updated 7 years ago
- The DIME resolver library and command line utilities.☆411Updated last year
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆514Updated 3 months ago
- Greybus subsystem repository☆120Updated 9 years ago
- All the Open Source Software provided by BMW for their i3☆600Updated 9 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- ACME Specification☆1,130Updated last year
- ☆178Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- ☆89Updated 9 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- Quantum Insert☆213Updated 6 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆322Updated 8 years ago
- Configuration to use gpg smartcards for ssh authentication☆159Updated 7 years ago