UCL-InfoSec / AnonID_OP
UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs
☆11Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for AnonID_OP
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 8 years ago
- Notebook collection☆10Updated 5 years ago
- Toolset to analyse TLS datasets☆12Updated 5 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- Browser extension that complements the PhishDetect service☆21Updated last year
- ☆34Updated 2 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆18Updated last year
- Investigation data from two reports around the Blue Coat networking kit.☆18Updated 10 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 9 years ago
- A local scanner for vulnerable web applications☆37Updated 2 weeks ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 7 years ago
- Maltego Transforms to Query Traffic Records☆33Updated 9 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- IRMA frontend☆25Updated 7 years ago
- Command-line utility to control Tor.☆88Updated 11 months ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Mass HTTP brute forcer to detect directories and interesting technologies☆10Updated 7 years ago