Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance
☆355Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for encryption-works
Users that are interested in encryption-works are comparing it to the libraries listed below
Sorting:
- An automated scanner and web dashboard for tracking TLS deployment across news organizations☆103Jan 5, 2022Updated 4 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆63May 22, 2014Updated 11 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- A (hopefully) unbiased timeline of events related to accusations against Jacob Appelbaum☆19Mar 18, 2017Updated 8 years ago
- iSEC Partners' research publications☆76Jul 8, 2016Updated 9 years ago
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆550May 5, 2020Updated 5 years ago
- An Ansible role for using tor!☆72Aug 23, 2015Updated 10 years ago
- Subgraph OS Handbook☆124Sep 4, 2017Updated 8 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- Python bindings for chdkptp☆15Mar 20, 2018Updated 7 years ago
- fixubuntu.com☆276Jul 1, 2015Updated 10 years ago
- OpenELEC-AntiPrism - The living room secure PC for everyone☆14Jan 28, 2017Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 2 months ago
- Beat censorship at its own game.☆43Aug 6, 2014Updated 11 years ago
- ☆198Jan 21, 2016Updated 10 years ago
- Find wifi channel with least interference☆54Jul 21, 2019Updated 6 years ago
- A public database for software and firmware hashes☆215Nov 12, 2016Updated 9 years ago
- kalibrate-bladeRF☆52Aug 3, 2021Updated 4 years ago
- Detect snooper on your system!☆85Feb 6, 2017Updated 9 years ago
- A tool for securing communications between a client and a DNS resolver☆21May 26, 2015Updated 10 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆77Mar 23, 2016Updated 9 years ago
- ☆22May 20, 2016Updated 9 years ago
- SIFT Bootstrap Script☆145Jun 20, 2017Updated 8 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- A portable customizable search engine☆12Oct 16, 2020Updated 5 years ago
- DEPRECATED, being merged in upstream. Web-based software for foodcoops - as used in NL.☆11Jun 20, 2017Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Jan 4, 2017Updated 9 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- A complete Earthstar toolbox in the console.☆13Jan 2, 2023Updated 3 years ago
- Encrypted Messaging Protocol Reference Implementation☆26Nov 14, 2017Updated 8 years ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 8 years ago
- A prototype server to swarm multiple DATs for Webrecorder☆14Apr 27, 2019Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- The Ohloh source code line counter with Ragel☆18May 10, 2018Updated 7 years ago