diracdeltas / reading
what i'm reading. read me.
☆39Updated 9 years ago
Alternatives and similar repositories for reading:
Users that are interested in reading are comparing it to the libraries listed below
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- HTTP framework☆48Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Helpful utilities and documentation for Free Software live audio/video streaming☆77Updated 10 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆94Updated 9 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- WikiMo documentation (mainly the security space, but everyone's welcome to use this)☆65Updated last year
- The "State considered harmful" paper☆105Updated 9 years ago
- Various articles I've written☆115Updated last year
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆60Updated 12 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- Jump to Full Encryption☆62Updated 8 years ago
- ☆15Updated 7 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Cryptolog is a tool for anonymizing webserver logs.☆68Updated 8 years ago
- torbsd web pages☆13Updated 6 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Hardened kernel generation - Deprecated☆49Updated 7 years ago
- ☆55Updated 9 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- free crypto audit☆31Updated 7 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆102Updated 3 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- Introduction to using the Hammer parser construction toolkit by Meredith L. Patterson☆80Updated 7 years ago
- ☆15Updated 8 years ago
- Hackers in yo' kernel!☆59Updated 9 years ago