defuse / ictm
A user-first approach to threat modeling.
☆16Updated 5 years ago
Alternatives and similar repositories for ictm:
Users that are interested in ictm are comparing it to the libraries listed below
- free crypto audit☆31Updated 7 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 10 years ago
- ☆10Updated 6 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- repository for tracking open tasks☆18Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- misc stuff☆19Updated 7 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 3 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 5 years ago
- The anonymous credentials zoo☆16Updated 3 years ago
- PANORAMIX repo☆20Updated 2 years ago
- a collection of teaching resources☆12Updated 6 years ago
- Command-line utility to control Tor.☆89Updated last year
- This is where we work on the newsletter☆28Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 7 years ago
- Secure multiparty messaging (kindof)☆21Updated 8 years ago
- Notes relating to secure messaging☆19Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago