CBOR version of the JOSE specifications
☆14Apr 4, 2017Updated 8 years ago
Alternatives and similar repositories for cose-spec
Users that are interested in cose-spec are comparing it to the libraries listed below
Sorting:
- Examples for the cose-spec☆18Mar 13, 2024Updated last year
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- Generic @veramo/cli agent deployment configuration https://veramo-agent.herokuapp.com☆14Apr 3, 2024Updated last year
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- A did-io driver for the DID "key" method☆32Sep 21, 2025Updated 5 months ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Example of a simple remoteStorage-enabled app using a custom data module☆28Sep 29, 2025Updated 5 months ago
- A Python implementation of the COSE specification (CBOR Object Signing and Encryption) described in RFC 8152.☆44Oct 9, 2025Updated 4 months ago
- Wallet And Credential Interactions for Presentation Exchange (Work continues at decentralized-identity/waci-didcomm#1 )☆17Apr 12, 2022Updated 3 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- A DID Key Implementation in TypeScript☆57Jul 21, 2024Updated last year
- Online book on command-line Linux usage, and Gentoo Linux in particular☆26Dec 19, 2016Updated 9 years ago
- Configurable Python Web Scraper☆31Aug 14, 2020Updated 5 years ago
- Verifiable Credentials for Supply Chain Interoperability Specification for HTTP☆29Apr 5, 2025Updated 11 months ago
- Public File Sharing Network for Demonsaw☆17Nov 25, 2016Updated 9 years ago
- Format that normalizes the definition of requirements for the issuance of a credential☆31Oct 26, 2023Updated 2 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Commercial quality COSE_Sign1 implementation in C for constrained environment. Works with MbtedTLS and OpenSSL Crypto.☆32Mar 1, 2026Updated last week
- ☆32Apr 4, 2017Updated 8 years ago
- Database agnostic, readily scalable APIs to store data!☆10Dec 12, 2022Updated 3 years ago
- Network Security Monitoring Framework☆48Oct 19, 2012Updated 13 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- The BBS Signature Scheme☆100Feb 26, 2026Updated last week
- Zephyr NUS sample implementation☆10Jun 26, 2018Updated 7 years ago
- Deepfakes weapon skins onto Valorant guns using CycleGAN☆10Jan 17, 2021Updated 5 years ago
- Dicionário Manezes - Português☆11Nov 20, 2017Updated 8 years ago
- High-level milestone planning for Qubes OS☆32Aug 16, 2016Updated 9 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Build text classifiers using 3 most popular machine learning / deep learning frameworks - Scikit-learn, PyTorch, TensorFlow☆10Sep 22, 2021Updated 4 years ago
- iMX233 singleboard PC docs☆12Sep 13, 2021Updated 4 years ago
- A Typescript implementation of the DIF Presentation Exchange specification.☆43Dec 16, 2024Updated last year
- A sample Java application that accesses the BigQuery API using the Google Java API Client Libraries. Used in the Google BigQuery Java Cod…☆48Mar 23, 2017Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Demo for health wallet with Verifiable Credentials and Decentralized Identifiers☆45Sep 10, 2024Updated last year
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆39Oct 22, 2015Updated 10 years ago
- v2☆12Oct 15, 2024Updated last year
- ☆12Updated this week
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago