The CryptoParty Handbook
☆535Oct 30, 2020Updated 5 years ago
Alternatives and similar repositories for handbook
Users that are interested in handbook are comparing it to the libraries listed below
Sorting:
- a collection of teaching resources☆12Feb 27, 2018Updated 8 years ago
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Aug 19, 2018Updated 7 years ago
- a collection of flyers and, where possible, their source files to help others make new cryptoparty flyers☆28Jul 8, 2024Updated last year
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- Installation, configuration and security hardening guidance for DeadDrop☆90Apr 15, 2018Updated 7 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆198Jan 21, 2016Updated 10 years ago
- OTR plugin for Hexchat☆22Dec 23, 2021Updated 4 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- OpenPGP in Python using Sequoia PGP☆18Mar 11, 2026Updated last week
- This is where we work on the newsletter☆28Dec 2, 2017Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- 🧪 Jekyll snippets for Visual Studio Code☆14Mar 19, 2020Updated 6 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- A collection of Nmap NSE scripts that I made.☆30Jan 14, 2013Updated 13 years ago
- ☆29Jul 29, 2014Updated 11 years ago
- Address book-like application to manage contact information.☆40Oct 10, 2018Updated 7 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆16Feb 24, 2016Updated 10 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- a decentralized marketplace for secret information☆43Nov 8, 2014Updated 11 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- Go package to connect to Ledger devices☆19Updated this week
- Notes relating to secure messaging☆20Jun 11, 2016Updated 9 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- ☆56Jan 25, 2016Updated 10 years ago
- The world's first sybil resistant, fully decentralized reputation protocol.☆29Mar 7, 2019Updated 7 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- A command line-based parameterized contracting tool☆46Sep 6, 2023Updated 2 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆147Sep 1, 2023Updated 2 years ago
- [DEPRECATED] Old RS website☆49Aug 31, 2021Updated 4 years ago
- Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance☆356Feb 19, 2020Updated 6 years ago
- mini os☆22Jul 16, 2017Updated 8 years ago
- PassLok for Email Chrome and Firefox extension☆11Nov 25, 2024Updated last year
- ☆19Dec 13, 2013Updated 12 years ago
- Breakthrough Listen Investigation for Periodic Spectral Signals☆15May 31, 2023Updated 2 years ago