diracdeltas / readingLinks
what i'm reading. read me.
☆39Updated 9 years ago
Alternatives and similar repositories for reading
Users that are interested in reading are comparing it to the libraries listed below
Sorting:
- Jump to Full Encryption☆61Updated 8 years ago
- HTTP framework☆48Updated 7 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 10 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 3 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Various articles I've written☆115Updated last year
- Does your library check TLS certificates properly?☆79Updated last year
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- WikiMo documentation (mainly the security space, but everyone's welcome to use this)☆66Updated last year
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- High-level milestone planning for Qubes OS☆31Updated 8 years ago
- ☆30Updated 10 years ago
- ☆62Updated 11 years ago
- Useful config-related files☆94Updated 4 years ago
- Encrypted Text Messaging☆147Updated 9 years ago
- ☆17Updated 7 years ago
- free crypto audit☆31Updated 8 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Updated 9 years ago
- Server automation recipes for the LEAP Platform. Written mostly using puppet, and licensed under the GPLv3.☆50Updated 6 years ago
- Chair and the Key☆64Updated 9 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- Distributed, tamper-resistant circumvention tools☆50Updated 9 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- ☆16Updated 7 years ago
- Helpful utilities and documentation for Free Software live audio/video streaming☆77Updated 10 years ago