UCL-InfoSec / AnonID_OP
UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs
☆11Updated 8 years ago
Alternatives and similar repositories for AnonID_OP:
Users that are interested in AnonID_OP are comparing it to the libraries listed below
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Network Tools☆32Updated last year
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- Toolset to analyse TLS datasets☆12Updated 5 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- PANORAMIX repo☆20Updated 2 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Python Certificate Transparency client☆11Updated 10 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- An embedded wireless security audit system☆21Updated 12 years ago
- Library and tools to access the Extended File System☆17Updated 3 months ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- Web of trust grapher☆38Updated last month
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago
- server for indexing and querying passive DNS observations☆46Updated last month
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆14Updated 3 weeks ago
- security in a box - tools and tactics for your digital security☆19Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Notebook collection☆10Updated 6 years ago
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- tamper resistant audit log☆18Updated 6 years ago
- USB keyboard where keystrokes are end-to-end encrypted between the keyboard and dom0☆9Updated 6 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- ☆35Updated 3 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago