cryptoparty / teaching-resources
a collection of teaching resources
☆12Updated 7 years ago
Alternatives and similar repositories for teaching-resources:
Users that are interested in teaching-resources are comparing it to the libraries listed below
- an attempt to create a universal basic set of presentation slides to help teach basic concepts at Cryptoparties.☆18Updated 10 years ago
- A user-first approach to threat modeling.☆16Updated 5 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 8 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 2 months ago
- reading lists☆31Updated 6 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- ☆29Updated 10 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- ☆37Updated 10 years ago
- ☆198Updated 9 years ago
- ☆20Updated 5 years ago
- ☆31Updated 4 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- Deterministic build environment for Zcash☆19Updated 6 months ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 9 months ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- The web site☆14Updated last year
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Replaced with Foreman + Puppet to not reinvent the wheel.☆9Updated 8 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Ruby API client for the Censys internet-wide network-scan search engine☆9Updated 6 months ago
- An application that helps you notify your friends and/or family if you've gone missing.☆11Updated 8 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆21Updated 9 years ago