cose-wg / cose-specView external linksLinks
CBOR version of the JOSE specifications
☆14Apr 4, 2017Updated 8 years ago
Alternatives and similar repositories for cose-spec
Users that are interested in cose-spec are comparing it to the libraries listed below
Sorting:
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Verifiable Credential Extensions☆12Feb 12, 2025Updated last year
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 9 years ago
- Generic @veramo/cli agent deployment configuration https://veramo-agent.herokuapp.com☆14Apr 3, 2024Updated last year
- ☆16Dec 19, 2024Updated last year
- Implementation of COSE in C++; Provides a C interface; Crypto by openssl or mbedtls☆31Apr 2, 2024Updated last year
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- A Python implementation of the COSE specification (CBOR Object Signing and Encryption) described in RFC 8152.☆43Oct 9, 2025Updated 4 months ago
- ☆16Jan 31, 2015Updated 11 years ago
- Configurable Python Web Scraper☆31Aug 14, 2020Updated 5 years ago
- KERI Agent in the cloud☆31Jan 14, 2026Updated last month
- Verifiable Credentials for Supply Chain Interoperability Specification for HTTP☆29Apr 5, 2025Updated 10 months ago
- A collection of shellcodes for BSD and Linux for exploit development☆26May 13, 2011Updated 14 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Secure components enabling application authentication, secure file storage, app level file-based keychain, and shredding for files on dis…☆60Sep 11, 2023Updated 2 years ago
- Public File Sharing Network for Demonsaw☆17Nov 25, 2016Updated 9 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- ☆32Apr 4, 2017Updated 8 years ago
- Database agnostic, readily scalable APIs to store data!☆10Dec 12, 2022Updated 3 years ago
- Miscellaneous Tools☆38May 31, 2015Updated 10 years ago
- Network Security Monitoring Framework☆48Oct 19, 2012Updated 13 years ago
- The BBS Signature Scheme☆97Jan 7, 2026Updated last month
- The archive and information hub for the cross-community interoperability project. Focus is on education and familiarity for various effor…☆94May 15, 2023Updated 2 years ago
- Exposing the UN/CEFACT vocabulary as web semantics☆13Sep 13, 2024Updated last year
- iMX233 singleboard PC docs☆12Sep 13, 2021Updated 4 years ago
- Apply to FNK0015, FNK0016☆11Aug 26, 2022Updated 3 years ago
- Build text classifiers using 3 most popular machine learning / deep learning frameworks - Scikit-learn, PyTorch, TensorFlow☆10Sep 22, 2021Updated 4 years ago
- High-level milestone planning for Qubes OS☆31Aug 16, 2016Updated 9 years ago
- ☆13Feb 3, 2026Updated last week
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated last month
- A Typescript implementation of the DIF Presentation Exchange specification.☆43Dec 16, 2024Updated last year
- A sample Java application that accesses the BigQuery API using the Google Java API Client Libraries. Used in the Google BigQuery Java Cod…☆48Mar 23, 2017Updated 8 years ago
- Verifiable Credentials for Education Task Force☆46Jan 6, 2026Updated last month
- Off-Chain Data Storage Made Easy☆11Apr 7, 2023Updated 2 years ago
- SCITT API Emulator☆10Nov 22, 2024Updated last year