indutny / keychairLinks
Chair and the Key
☆64Updated 9 years ago
Alternatives and similar repositories for keychair
Users that are interested in keychair are comparing it to the libraries listed below
Sorting:
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Documenting The 2016 Tech Bubble☆30Updated 9 years ago
- Generate self-signed x509 certificates valid for multiple URLs/IPs☆145Updated 7 years ago
- GitHub repos in your filesystem☆118Updated 9 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Scan a list of sites to see which support HTTPS, SPDY/3.1 and HTTP/2☆78Updated 9 years ago
- One way streaming encryption based on libsodium's secretbox primitive☆84Updated 5 years ago
- A chrome extension that enables automatic encrypting and decryption of GPG messages over the web☆18Updated 9 years ago
- Encrypted P2P chat over ICMP.☆79Updated 9 years ago
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 8 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 9 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- A 50MB linux distribution that has dat-container for booting live containers on mac OS☆122Updated 7 years ago
- curl wrapper that uses chrome cookies☆53Updated 4 years ago
- ☆98Updated 3 years ago
- A presentation about Docker, systemd, and containerization, given at the Recurse Center☆78Updated 10 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- 🗃️ This repository has been integrated into mitmproxy/mitmproxy.☆350Updated 9 years ago
- Use some TLS servers for trusted timestamping☆42Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- A Next Generation Honeypot for a 2016 Oregon State Senior Project☆67Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- Protocol detecting server library☆62Updated 4 years ago
- Describe C function prototypes in JSON.☆24Updated 9 years ago
- 1-1 pipe over bluetooth low energy☆95Updated 10 years ago
- A blog post about capturing user's ssh keys☆17Updated 4 years ago
- stupid website for the stupid hackathon☆52Updated 5 years ago
- Break MD5/SHA1/SHA256/SHA512 hashes using wordlists, password lists and string permutations.☆81Updated 6 years ago