Jump to Full Encryption
☆61Oct 29, 2016Updated 9 years ago
Alternatives and similar repositories for jfe
Users that are interested in jfe are comparing it to the libraries listed below
Sorting:
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- DEPRECATED - TLS regression scanner for Firefox☆19Dec 16, 2022Updated 3 years ago
- IRC log viewer by iain collins☆21Feb 5, 2011Updated 15 years ago
- Tiny ML interpreter☆16Feb 16, 2014Updated 12 years ago
- MIPS syntax highlightning package for sublime text 2☆13May 14, 2018Updated 7 years ago
- IETF I-D for Network Time Security☆11Mar 25, 2020Updated 5 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- Chef cookbook for hardening macOS systems☆27May 25, 2017Updated 8 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- Go client library for SeatGeek's Sixpack AB testing framework.☆20Sep 2, 2013Updated 12 years ago
- Authenticated encryption scheme prover/synthesizer☆15Aug 25, 2022Updated 3 years ago
- ☆15Feb 27, 2017Updated 9 years ago
- WARNING: Deprecated! See Privacy Pass☆99Jan 5, 2017Updated 9 years ago
- The CentOS Project Calendar☆12Mar 14, 2025Updated 11 months ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- Rend server to proxy simple requests to an HTTP proxy☆20Jun 9, 2017Updated 8 years ago
- ☆25Jul 8, 2015Updated 10 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Dec 16, 2016Updated 9 years ago
- A Go TLS/HTTPS server demo that uses a Yubikey as the backend for it's private key☆184May 3, 2018Updated 7 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 8 months ago
- The Silence of Intelligence — A comprehensive analysis of Anthropic CEO Dario Amodei's philosophy on Scaling Laws, AI safety, and the fut…☆18Updated this week
- Two person authentication module for PAM☆29May 26, 2017Updated 8 years ago
- Tools to manage the Linux NetLabel subsystem☆28Aug 30, 2025Updated 6 months ago
- Threat Specification Language☆28Oct 6, 2015Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- tool for character manipulations☆31Sep 12, 2025Updated 5 months ago
- Pure Python SSL, TLS and DTLS library☆36Mar 4, 2018Updated 8 years ago
- A memory-hard password hashing function.☆71May 29, 2023Updated 2 years ago
- A Chrome Extension that detects Phishing Websites and alerts the user regarding the same.☆11Jun 23, 2019Updated 6 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- ☆16Sep 22, 2014Updated 11 years ago
- Go http logger for apex/log.☆36Feb 26, 2020Updated 6 years ago
- eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs eecs ee…☆31Mar 11, 2017Updated 8 years ago
- A collection of data science examples implemented across a variety of languages and libraries.☆34Jan 14, 2016Updated 10 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- Get TOTP from the command line using TOTP secrets in Sops encrypted files.☆43Updated this week
- ☆27Jun 15, 2016Updated 9 years ago
- Bootstrap AWS account with Terraform and Go.CD☆29Oct 24, 2017Updated 8 years ago