jcryptool / coreLinks
JCrypTool Core Plug-ins
☆172Updated 2 years ago
Alternatives and similar repositories for core
Users that are interested in core are comparing it to the libraries listed below
Sorting:
- JCrypTool Crypto Plug-ins☆75Updated 2 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆167Updated 6 years ago
- Cryptanalysis library for breaking classical ciphers☆27Updated 6 years ago
- TXT and PDF documents from the NSA☆188Updated 10 years ago
- NIST/NCCoE Mobile Threat Catalogue☆150Updated 4 months ago
- The Scyther Tool for the symbolic analysis of security protocols☆105Updated 3 months ago
- Source code for my crackstation.net website.☆166Updated 4 years ago
- A PGP packet visualizer☆184Updated 2 months ago
- Qubes component: core-admin☆137Updated this week
- ROCA: Infineon RSA key vulnerability☆490Updated 2 years ago
- Assesses CPU security of embedded devices. #nsacyber☆140Updated 9 years ago
- Qubes documentation☆381Updated this week
- Qubes Security Pack☆530Updated 2 weeks ago
- Qubes-based SecureDrop Journalist Workstation environment for submission handling☆166Updated 2 weeks ago
- CLIP OS product recipes☆66Updated 5 years ago
- Artifacts for the USENIX publication.☆58Updated 6 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆194Updated 5 years ago
- My personal blog and website (see http://blog.invisiblethings.org/)☆63Updated 2 years ago
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ -- discuss proposals on tor-dev@lists.torprojec…☆251Updated last year
- Advanced development framework for stealthier pluggable transports☆98Updated 5 years ago
- ☆52Updated 8 years ago
- Python-ASN1 is a simple ASN.1 encoder and decoder for Python 2.7 and 3.5+.☆106Updated 7 months ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Updated 5 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- Veracrypt Password Cracker☆79Updated 3 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆204Updated this week
- An implementation of the Wickr Secure Messaging Protocol in C☆381Updated 2 months ago
- AFF is an open and extensible file format to store disk images and associated metadata.☆91Updated 3 months ago
- TPM-Fail Attack code & data☆123Updated 2 years ago