UCL-InfoSec / AnonID_OP
UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs
☆11Updated 8 years ago
Alternatives and similar repositories for AnonID_OP
Users that are interested in AnonID_OP are comparing it to the libraries listed below
Sorting:
- Toolset to analyse TLS datasets☆12Updated 5 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A list of XMPP servers available as hidden services for use with the Prosody server and mod_onions☆18Updated 5 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- IRMA frontend☆25Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- A generic log anonymizer☆21Updated 3 years ago
- Universal guided editor and reverse engineering tool for binary data.☆11Updated 7 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Updated 13 years ago
- Command-line utility to control Tor.☆89Updated last year
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- tamper resistant audit log☆18Updated 6 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Network Tools☆32Updated last year
- Web of trust grapher☆38Updated last month
- ☆30Updated 10 years ago
- ☆35Updated 3 years ago