Jump to Full Encryption
☆61Oct 29, 2016Updated 9 years ago
Alternatives and similar repositories for jfe
Users that are interested in jfe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Deriving morphisms for OCaml data structures☆10Aug 28, 2019Updated 6 years ago
- Tiny ML interpreter☆16Feb 16, 2014Updated 12 years ago
- Rate Limiting using Cloud Resources☆20Oct 31, 2016Updated 9 years ago
- MIPS syntax highlightning package for sublime text 2☆13May 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- tl-create is a cross-platform command line tool to create a X.509 trust list from various trust stores. (Keywords: CABFORUM, eIDAS, WebPK…☆33Apr 2, 2026Updated 2 weeks ago
- DEPRECATED - TLS regression scanner for Firefox☆19Dec 16, 2022Updated 3 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Sep 15, 2021Updated 4 years ago
- Authenticated encryption scheme prover/synthesizer☆16Aug 25, 2022Updated 3 years ago
- WARNING: Deprecated! See Privacy Pass☆99Jan 5, 2017Updated 9 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- Rust wrapper for Obliv-C☆11Feb 14, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- what i'm reading. read me.☆38Nov 12, 2015Updated 10 years ago
- ☆13Mar 23, 2018Updated 8 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆19Feb 14, 2020Updated 6 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- first commit☆24Feb 16, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 9 months ago
- IETF I-D for Network Time Security☆11Mar 25, 2020Updated 6 years ago
- Threat Specification Language☆28Oct 6, 2015Updated 10 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Turn an arbitrary command into a Kubernetes Key Management Service GRPC server☆15Apr 4, 2018Updated 8 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Dec 16, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- An LLM leaderboard for stateful agents☆21Oct 16, 2025Updated 6 months ago
- SBT Auto Plugin to manage client side git hooks☆17Jan 4, 2024Updated 2 years ago
- Sample for ICS-20 transfer between Hyperledger Fabric and Cosmos-based Blockchain☆10Apr 27, 2022Updated 3 years ago
- exports your dependency graph to a preloaded local repository☆15May 10, 2019Updated 6 years ago
- Barcode scanner on a Pico W on micropython, publishing to mqtt☆14Nov 15, 2024Updated last year
- Probing a network for Ubiquiti devices and parsing responses☆19Sep 29, 2016Updated 9 years ago