Valodim / pgp-vanity-keygen
generate pgp keys with vanity fingerprints
☆17Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for pgp-vanity-keygen
- A tool to help you understand TPM commands and responses.☆34Updated last month
- Zero-trust SSH CA☆28Updated 2 months ago
- Web of trust grapher☆39Updated 8 months ago
- DNS Firewall Enforcer☆49Updated 5 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwares☆49Updated 5 years ago
- A history of PGP-related vulnerabilities☆22Updated 3 years ago
- 🥸 p2p gossip network for update transparency, based on pgp 🥸☆16Updated 2 months ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆125Updated 3 years ago
- Artifacts for the USENIX publication.☆57Updated 4 years ago
- torrent -> http plumbing☆24Updated 4 years ago
- BusKill kill cord for Linux☆31Updated 4 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆21Updated last year
- A tool that primes the OCSP cache of nginx for certificates managed by Certbot, in order to make OCSP stapling work reliably.☆29Updated 2 weeks ago
- Tools to work with the pwnedkeys.com API☆10Updated 5 years ago
- A PAM module to test passwords against previous leaks at haveibeenpwned.com☆36Updated 5 years ago
- Cooperative RSA signing☆25Updated 4 years ago
- Tool that creates a shell environment where actions have no consequences☆21Updated 3 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 2 months ago
- Abusing U2F to 'store' a stable secret☆17Updated 8 years ago
- OnionTip is a web app which parses Tor relay data to allow users to tip volunteers for running relay in a fair and open way.☆53Updated 6 years ago
- trustor (PoC)☆25Updated 2 years ago
- A PAM module that protects sensitive data and provides a panic function for emergency situations. Authentication through passwords or rem…☆57Updated last year
- Unofficial gnuk mirror☆19Updated 3 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- A warrant canary system☆30Updated 6 years ago
- free crypto audit☆31Updated 7 years ago
- Linux kernel module to fight against police terror☆28Updated 3 years ago