Bram's steganographic framework
☆494Apr 23, 2014Updated 12 years ago
Alternatives and similar repositories for DissidentX
Users that are interested in DissidentX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- generate pgp keys with vanity fingerprints☆18Dec 20, 2016Updated 9 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- programmable proxy for censorship circumvention☆155Jan 11, 2026Updated 3 months ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Very simple Netflix API client☆24Jun 30, 2010Updated 15 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fine-grained lattice primitives for Haskell☆18Mar 8, 2018Updated 8 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- ☆16Jul 23, 2018Updated 7 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- provable bitcoin HODLing☆22Mar 23, 2017Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Optimizations for Pairing-Based Cryptography☆17Sep 10, 2021Updated 4 years ago
- ☆15Jul 8, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Rust library for proof-carrying disclosures☆23Apr 10, 2024Updated 2 years ago
- Explicitly Typed exceptions as a library☆22Dec 27, 2020Updated 5 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- The Internet censorship bibliography.☆161Apr 1, 2026Updated last month
- Decentralised gossip driven data sharing for the 21st century.☆60Jul 6, 2023Updated 2 years ago
- Detect some forms of linux kernel tampering☆12Jun 12, 2015Updated 10 years ago
- A demo help you learn how to use DJI Mobile SDK to access the media resources in the SD card of the aircraft's camera to preview photos, …☆11Jun 7, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- My Cornell PhD dissertation: Scaling the Infrastructure of Practical Blockchain Systems☆15Sep 10, 2021Updated 4 years ago
- OS build toolkit for Live CD ISO images☆13Dec 23, 2020Updated 5 years ago
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated last year
- [OBSOLETE] - needs updating - An example client to the Stremio add-ons protocol, similar to Stremio's Discover☆10Jul 31, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Asynchronous Cloudant / CouchDB interface for Python☆35May 4, 2016Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Repository merger for apt-based distros☆14Jun 17, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Feature experiments to advance the art of Bitcoin - Build your own sidechain☆16May 7, 2017Updated 8 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Past and future talks☆12Jan 18, 2021Updated 5 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- Hide app labels when not scrolling☆13May 8, 2023Updated 2 years ago
- ☆13Nov 10, 2023Updated 2 years ago
- LoFiRe Rust implementation☆17Feb 2, 2023Updated 3 years ago