agix / secretinView external linksLinks
Open source secret manager with sharing possibility based on webapi crypto http://www.w3.org/TR/WebCryptoAPI/
☆39Jul 7, 2017Updated 8 years ago
Alternatives and similar repositories for secretin
Users that are interested in secretin are comparing it to the libraries listed below
Sorting:
- Build lib around secretin https://github.com/agix/secretin and migrate to the future !☆17May 18, 2023Updated 2 years ago
- Go HTTP Strict Transport Security library☆22Oct 3, 2024Updated last year
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- An Ansible role to build and maintain your own mailstack, refactored from Sovereign.☆13May 8, 2020Updated 5 years ago
- ANSI terminal tool for python, colored shell and other handy fancy features☆43Dec 19, 2023Updated 2 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- hyperfused client for node☆22Sep 4, 2015Updated 10 years ago
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆57Apr 2, 2017Updated 8 years ago
- A CSRF demonstration of stealing local Redis data, and encrypting all Redis instances on a local network☆53Feb 26, 2017Updated 8 years ago
- Repository for ATSHA204 Example code and design files☆46May 2, 2015Updated 10 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Aug 23, 2016Updated 9 years ago
- Verifiable Random Function☆30Jun 22, 2020Updated 5 years ago
- ☆26Oct 2, 2018Updated 7 years ago
- python tor client☆27Sep 19, 2015Updated 10 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- ☆72Nov 6, 2021Updated 4 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- A networked fuse mounting daemon that runs over tcp or stdin/stdout.☆32Dec 9, 2015Updated 10 years ago
- Non-C Implementations of the yescrypt KDF.☆30Jan 16, 2019Updated 7 years ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆35Jun 28, 2018Updated 7 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆82Nov 22, 2019Updated 6 years ago
- Argon2 password hashing scheme in pure Go☆35Sep 25, 2024Updated last year
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- PadCMS - backend☆43Oct 27, 2014Updated 11 years ago
- Unofficial Linux client for the Blokada-VPN-service☆10Aug 26, 2022Updated 3 years ago
- Automated Multi-Cloud Application Deployment using terraform. The inter-connectivity between the public clouds is preformed using Site-T…☆11Sep 24, 2020Updated 5 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Compressed Bloom Filters (Golomb-compressed sequences, with indices)☆17May 19, 2013Updated 12 years ago
- CameraCipher Library (an IOCipher project)☆11Jul 14, 2015Updated 10 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago