gabrielg / cryptography-to-mathematics
Chrome extension that replaces occurrences of 'cryptography' to 'mathematics'
☆15Updated 9 years ago
Alternatives and similar repositories for cryptography-to-mathematics:
Users that are interested in cryptography-to-mathematics are comparing it to the libraries listed below
- HTTP framework☆48Updated 7 years ago
- Good Game Auto Blocker☆330Updated 7 years ago
- https://noncombatant.org/2014/03/11/privacy-and-security-settings-in-chrome/☆17Updated 9 years ago
- (Deprecated) https guidance for the 18F team☆156Updated 8 years ago
- Makes generating machine-readable, digitally signed warrant canary statements simpler☆147Updated 5 years ago
- Badass encryption for Twitter☆66Updated 8 years ago
- Grab files matching a search specification from Github☆110Updated 4 years ago
- attempts to map which submarine cables are tapped and where, based on Snowden documents.☆60Updated 10 years ago
- stupid website for the stupid hackathon☆51Updated 4 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- A tool to create web frontends to introspect, administer, and deploy mesh networks☆29Updated 9 years ago
- An injector for ISP injectors☆29Updated 9 years ago
- a simple server that connects calls between citizens and their congress person using the Twilio API☆66Updated 3 years ago
- Distributed, tamper-resistant circumvention tools☆49Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆94Updated 5 years ago
- Helpful utilities and documentation for Free Software live audio/video streaming☆77Updated 10 years ago
- A blog post about capturing user's ssh keys☆17Updated 3 years ago
- Read the TPP!☆28Updated last year
- Print code and markup beautifully and quick as lightning on paper.☆17Updated 7 years ago
- 🗃️ This repository has been integrated into mitmproxy/mitmproxy.☆348Updated 8 years ago
- A project to calculate CO2 emissions of mining bitcoin.☆50Updated 10 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- ☆99Updated 2 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- Hackers in yo' kernel!☆59Updated 9 years ago
- An Ansible role for using tor!☆72Updated 9 years ago