cose-wg / cose-specView external linksLinks
CBOR version of the JOSE specifications
☆14Apr 4, 2017Updated 8 years ago
Alternatives and similar repositories for cose-spec
Users that are interested in cose-spec are comparing it to the libraries listed below
Sorting:
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Verifiable Credential Extensions☆12Feb 12, 2025Updated last year
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 13 years ago
- Generic @veramo/cli agent deployment configuration https://veramo-agent.herokuapp.com☆14Apr 3, 2024Updated last year
- ☆16Dec 19, 2024Updated last year
- A did-io driver for the DID "key" method☆32Sep 21, 2025Updated 4 months ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Example of a simple remoteStorage-enabled app using a custom data module☆28Sep 29, 2025Updated 4 months ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- A DID Key Implementation in TypeScript☆56Jul 21, 2024Updated last year
- A Javascript CBOR-LD processor for web browsers and Node.js apps.☆25Sep 5, 2025Updated 5 months ago
- Configurable Python Web Scraper☆31Aug 14, 2020Updated 5 years ago
- KERI Agent in the cloud☆31Jan 14, 2026Updated last month
- A collection of shellcodes for BSD and Linux for exploit development☆26May 13, 2011Updated 14 years ago
- Verifiable Credentials for Supply Chain Interoperability Specification for HTTP☆29Apr 5, 2025Updated 10 months ago
- Public File Sharing Network for Demonsaw☆17Nov 25, 2016Updated 9 years ago
- Format that normalizes the definition of requirements for the issuance of a credential☆31Oct 26, 2023Updated 2 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Database agnostic, readily scalable APIs to store data!☆10Dec 12, 2022Updated 3 years ago
- Network Security Monitoring Framework☆48Oct 19, 2012Updated 13 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- The archive and information hub for the cross-community interoperability project. Focus is on education and familiarity for various effor…☆94May 15, 2023Updated 2 years ago
- Apache Milagro Decentralized Trust Authority☆11Mar 7, 2023Updated 2 years ago
- High-level milestone planning for Qubes OS☆31Aug 16, 2016Updated 9 years ago
- Zephyr NUS sample implementation☆10Jun 26, 2018Updated 7 years ago
- Deepfakes weapon skins onto Valorant guns using CycleGAN☆10Jan 17, 2021Updated 5 years ago
- API server for interacting with decentralised identity functionality on the cheqd Network☆11Feb 5, 2026Updated last week
- Verifiable Credentials for Education Task Force☆46Jan 6, 2026Updated last month
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Demo for health wallet with Verifiable Credentials and Decentralized Identifiers☆45Sep 10, 2024Updated last year
- Verifiable Credential Server for Web5.☆11Dec 17, 2022Updated 3 years ago
- Trust Registry Protocol Specification☆14Feb 7, 2026Updated last week
- openbharatocr is an opensource python library which facilitates extracting data from official indian government documents☆14Sep 4, 2025Updated 5 months ago
- Example Web app using Glaze packages☆11May 27, 2022Updated 3 years ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- Off-Chain Data Storage Made Easy☆11Apr 7, 2023Updated 2 years ago