IAV quantumSAR - "Quantum-proof your data with our state of the art cryptographic implementation"
☆55Jan 9, 2026Updated 2 months ago
Alternatives and similar repositories for IAV_quantumSAR
Users that are interested in IAV_quantumSAR are comparing it to the libraries listed below
Sorting:
- Open-source interface to a user's defaults on macOS.☆15Dec 21, 2025Updated 2 months ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Extism Haskell Host SDK - easily run WebAssembly modules / plugins from Haskell applications☆11Dec 3, 2024Updated last year
- Streamlining Solution, Architecture, and Requirements for perfect Alignment.☆35Updated this week
- Translating WebAssembly into the most simple LLVM IR.☆14Jan 6, 2026Updated 2 months ago
- Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper☆17Apr 21, 2022Updated 3 years ago
- Replacement dns module in pure javascript for node.js☆13May 27, 2021Updated 4 years ago
- Serial I/O over bluetooth for NodeJS☆12Oct 17, 2020Updated 5 years ago
- Blinkenlights Berlin☆11Mar 4, 2014Updated 12 years ago
- AutoBib: create beautiful bib files and html publication pages automagically☆14May 7, 2025Updated 10 months ago
- Dockerized OpenSC with pkcs15-init, pkcs11-tool, pkcs15-tool and more. It also comes with libp11 for openssl☆10Jul 31, 2021Updated 4 years ago
- demonstrating shunting yard algorithm and evaluation of arithmetic expressions☆15Jan 11, 2025Updated last year
- Python bindings for Monocypher crypto library.☆18Feb 12, 2026Updated last month
- ☆10Jul 3, 2021Updated 4 years ago
- A FreeRTOS-based OS for the PineTime smartwatch.☆12Dec 13, 2019Updated 6 years ago
- Kuma a cross-chain wallet that offers seamless management and transfer of assets between EVM and WASM chains.☆12Nov 8, 2024Updated last year
- A brief, self-descriptive, serde-compatible binary format.☆18Jan 4, 2026Updated 2 months ago
- The CanBadgers best friend! Control multiple CanBadgers over Ethernet.☆21Mar 19, 2021Updated 5 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Point-and click access to MCU peripheral registers☆24Jan 3, 2023Updated 3 years ago
- A wrapper that enables TLS support (TLS 1.2 with AES 128 GCM) for existing applications without code change.☆25Jan 6, 2020Updated 6 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- a custom 7z, which can use three keys instead of password to extract zip file.☆13Oct 5, 2018Updated 7 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated last year
- A technical guide to building technology for VC funds: from understanding the domain to shipping production systems.☆27Feb 2, 2026Updated last month
- ☆13Jan 4, 2016Updated 10 years ago
- A curated blocklist of Autonomous System Numbers (ASNs) associated with VPN providers, datacenters, and hosting services commonly used fo…☆15Mar 11, 2026Updated last week
- Visual C++ 6.0 compiler in a Docker container☆16Mar 8, 2022Updated 4 years ago
- Tools used to extract Flash memory from locked MPC5566 (Hardwear.io 2025 talk)☆20May 30, 2025Updated 9 months ago
- JWTLens - Burp Suite extension for automated JWT security testing. 62 checks: passive scanning, algorithm confusion, signature bypass, …☆30Updated this week
- A security dashboard for analyzing cyber-physical system designs☆17Oct 1, 2021Updated 4 years ago
- TCCharger voltage & current control☆14Jul 13, 2018Updated 7 years ago
- A toy linker for WebAssembly object files.☆19Aug 29, 2022Updated 3 years ago
- TN's Double Counter alternative; known locally as ProxyGuard or Cybermonay☆16Jul 5, 2025Updated 8 months ago
- Private keys that have become public ...☆21Jun 8, 2022Updated 3 years ago
- Personal configuration framework.☆26Jun 12, 2025Updated 9 months ago
- ☆21Jun 20, 2025Updated 9 months ago