defuse / ictm
A user-first approach to threat modeling.
☆15Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for ictm
- free crypto audit☆31Updated 7 years ago
- misc stuff☆19Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- ☆17Updated 10 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 9 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- ☆10Updated 6 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- reading lists☆31Updated 5 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- repository for tracking open tasks☆18Updated 6 years ago
- Simple script for PGP encrypted newsletter☆26Updated 8 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Updated 2 years ago
- ☆11Updated 4 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 7 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 8 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Simple application for playing with elliptic curves☆42Updated last year
- ☆29Updated 10 years ago
- This is where we work on the newsletter☆28Updated 6 years ago
- Notes relating to secure messaging☆19Updated 8 years ago
- Collection of somewhat useful stuff for CTF events☆37Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 8 years ago