StorjOld / file-encryptorLinks
Module for encrypting and decrypting files.
☆14Updated 10 years ago
Alternatives and similar repositories for file-encryptor
Users that are interested in file-encryptor are comparing it to the libraries listed below
Sorting:
- Evil Genius plays the role of the Descartes demon, creating a distorted view of the internet with censorship (it's a censorship simulator…☆38Updated 11 years ago
- Common utility modules shared between various Python based Yubico projects.☆12Updated 8 years ago
- Slackbot for Keybase☆63Updated this week
- A simple way of exposing any docker container as a tor hidden service☆29Updated 11 years ago
- Low level storj protocol reference implementation.☆15Updated 9 years ago
- ☆20Updated 9 years ago
- Federated server for getting, pushing, and auditing data on untrusted nodes.☆22Updated 9 years ago
- A Python port of the triplesec library.☆82Updated 2 years ago
- Docker configs and build scripts.☆23Updated 11 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Dines is the definitive answer to DNS testing☆21Updated 7 years ago
- Chrome Speech Recognition exploit demo☆82Updated 12 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- A docker'ized internal-only tor relay.☆41Updated 10 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Updated 4 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Miscellaneous python utilities.☆15Updated 9 years ago
- A concept of distributed anonymous marketplace.☆200Updated 12 years ago
- ☆15Updated 8 years ago
- Silently extract a YubiKey serial number☆20Updated 5 months ago
- An experimental cryptographic virtual machine☆14Updated 8 years ago
- Beat censorship at its own game.☆43Updated 11 years ago
- Hash-based password manager☆19Updated 6 years ago
- Easy creation of Tor Hidden Services☆39Updated 10 years ago
- Twerp is the telephone hackers toolkit. It's also a command-line app for Twilio, written in Python☆27Updated 5 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 11 years ago
- Malware visualization on earth map☆40Updated 11 years ago
- TOR Mail encrypted server for Hidden Services☆44Updated 9 years ago
- a collection of teaching resources☆12Updated 7 years ago
- Hackerspace Access Control and Check in System☆12Updated 9 years ago