dmbb / ProtozoaLinks
Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIGSAC CCS '20]
☆24Updated 4 years ago
Alternatives and similar repositories for Protozoa
Users that are interested in Protozoa are comparing it to the libraries listed below
Sorting:
- Go Trusted Execution Environment (TEE)☆129Updated 4 months ago
- ☆26Updated this week
- List of crackpot 'scientists' and 'thinkers'☆19Updated 3 weeks ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆39Updated 5 months ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated last month
- Geolocate your files!☆16Updated 3 years ago
- ☆12Updated last year
- Making transparency normal!☆24Updated last year
- Your ultimate infrastructure to run a CTF, with a BeyondCorp-like zero-trust network and simple infrastructure-as-code configuration.☆70Updated 2 years ago
- PANORAMIX repo☆20Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- tamper resistant audit log☆18Updated 6 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- censors pose a threat to the entire Internet☆135Updated 3 years ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆95Updated 11 months ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆32Updated 4 months ago
- A Tamarin model and analysis of EMV☆33Updated 4 years ago
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆13Updated this week
- A collection of SSL/TLS security related resources.☆52Updated 6 months ago
- QARMA block cipher in C☆30Updated 2 years ago
- Vault Exploit Defense☆127Updated 10 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 11 months ago
- Models for authenticated key exchange in Tamarin☆12Updated 5 years ago
- A history of PGP-related vulnerabilities☆24Updated 4 years ago