ProjectVault / orpLinks
☆418Updated 10 years ago
Alternatives and similar repositories for orp
Users that are interested in orp are comparing it to the libraries listed below
Sorting:
- Use OpenPGP-based encryption in Yahoo mail.☆222Updated 9 years ago
- Double Ratchet Algorithm☆375Updated 9 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 4 years ago
- ZeroDB server and client-side example of using it☆136Updated 9 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆805Updated 8 years ago
- SUIDGuard - a TrustedBSD Kernel Extension that adds mitigations to protect SUID/SGID processes a bit more☆392Updated 9 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 10 years ago
- Pond☆917Updated 4 years ago
- INTERLOCK - file encryption and HSM front-end☆305Updated last month
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- ☆780Updated 7 years ago
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- Provably Anonymous Overlay☆326Updated 11 years ago
- Greybus subsystem repository☆120Updated 9 years ago
- Memory-hard scheme Argon2☆207Updated 5 years ago
- The USG is Good, not Bad☆402Updated 6 years ago
- U2F reference implementations☆589Updated 3 years ago
- ACME Specification☆1,129Updated last year
- Pixel-perfect LastPass phishing☆336Updated 9 years ago
- An open source miniPCIe development board based on the Xilinx Spartan 6 LX150T☆146Updated 10 years ago
- ☆89Updated 9 years ago
- A public database for software and firmware hashes☆215Updated 9 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆321Updated 8 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- Noise Specification☆460Updated 7 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- Open Database of Firmware Test Results☆151Updated 9 years ago
- Transform your PC into a Raspberry Pi☆152Updated 10 years ago