indutny / keychairLinks
Chair and the Key
☆64Updated 10 years ago
Alternatives and similar repositories for keychair
Users that are interested in keychair are comparing it to the libraries listed below
Sorting:
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Generate self-signed x509 certificates valid for multiple URLs/IPs☆144Updated 7 years ago
- Documenting The 2016 Tech Bubble☆30Updated 9 years ago
- GitHub repos in your filesystem☆116Updated 10 years ago
- One way streaming encryption based on libsodium's secretbox primitive☆83Updated 6 years ago
- Encrypted P2P chat over ICMP.☆79Updated 10 years ago
- Pretty Curved Privacy☆122Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆57Updated last year
- Totally Isolated TLS Unwrapping Server☆111Updated 5 years ago
- ☆115Updated 10 years ago
- given an ip address, return which cloud provider it belongs to (AWS, GCE, etc)☆143Updated 7 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Updated 9 years ago
- A Next Generation Honeypot for a 2016 Oregon State Senior Project☆67Updated 9 years ago
- curl wrapper that uses chrome cookies☆53Updated 5 years ago
- **NOT MAINTAINED** Bud - The TLS Terminator☆449Updated 6 years ago
- A 50MB linux distribution that has dat-container for booting live containers on mac OS☆122Updated 8 years ago
- Scan a list of sites to see which support HTTPS, SPDY/3.1 and HTTP/2☆78Updated 9 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 9 years ago
- Break MD5/SHA1/SHA256/SHA512 hashes using wordlists, password lists and string permutations.☆81Updated 7 years ago
- A quick and easy way to test CSP behavior on modern browsers☆49Updated 7 years ago
- Describe C function prototypes in JSON.☆24Updated 10 years ago
- ☆70Updated 9 years ago
- 1-1 pipe over bluetooth low energy☆95Updated 10 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- Watch the data fly☆269Updated 4 years ago
- send files over the local network using airpaste and tar☆92Updated 10 years ago
- A blog post about capturing user's ssh keys☆17Updated 4 years ago
- ZeroDB server and client-side example of using it☆136Updated 9 years ago