ibmo96 / QSX
A tool to integrate post-quantum secure TLS in NGINX using OpenSSL
☆9Updated 3 years ago
Alternatives and similar repositories for QSX:
Users that are interested in QSX are comparing it to the libraries listed below
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆22Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Next generation of Qubes OS builder☆20Updated 3 weeks ago
- USB armory - Mass Storage firmware☆24Updated 3 months ago
- An app launcher to start apps in a restrictive sandbox https://www.kicksecure.com/wiki/sandbox-app-launcher☆41Updated 2 months ago
- .onion discovery via SRV DNS lookups for use with postfix☆14Updated last year
- ☆34Updated 6 months ago
- I2P bindings for Twisted.☆15Updated 2 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 4 years ago
- Randomizes clock when systems boots by adding a few seconds and nanoseconds to enforce the design goal, that the host clock and Gateway/…☆13Updated 3 months ago
- Perl library for SHODAN☆17Updated 11 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- A small tool for brute forcing the access code of a Yubico Yubikey.☆20Updated 4 years ago
- CryptoLyzer is a fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers…☆38Updated 3 months ago
- ☆14Updated 6 years ago
- Linux TPM Trusted Boot binary_bios_measurements file parser/reconstructor☆21Updated 4 years ago
- CLIP OS toolkit (cosmk)☆16Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Authenticate a tarball through a signed tag in a git repository (with reproducible builds)☆17Updated 2 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- ☆14Updated 2 years ago
- A tool to help you understand TPM commands and responses.☆42Updated 4 months ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 8 years ago
- Build and Interact with a Set of Virtual Machines☆15Updated 2 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- hostnames registration application for I2P☆11Updated 2 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- I2P analysis network.☆15Updated 9 years ago