jcryptool / coreLinks
JCrypTool Core Plug-ins
☆173Updated 2 years ago
Alternatives and similar repositories for core
Users that are interested in core are comparing it to the libraries listed below
Sorting:
- JCrypTool Crypto Plug-ins☆75Updated 2 years ago
- Cryptanalysis library for breaking classical ciphers☆27Updated 6 years ago
- A PGP packet visualizer☆185Updated 3 months ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆168Updated 6 years ago
- Artifacts for the USENIX publication.☆58Updated 6 years ago
- ROCA: Infineon RSA key vulnerability☆492Updated 2 years ago
- NIST/NCCoE Mobile Threat Catalogue☆151Updated 5 months ago
- Open source Apis to access a Secure Element from a Web application☆17Updated 9 years ago
- TPM-Fail Attack code & data☆124Updated 2 years ago
- Qubes-based SecureDrop Journalist Workstation environment for submission handling☆169Updated this week
- Assesses CPU security of embedded devices. #nsacyber☆141Updated 9 years ago
- An implementation of the Wickr Secure Messaging Protocol in C☆379Updated 3 months ago
- An audio firewall for Chrome!☆71Updated last year
- ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams☆83Updated 6 years ago
- Qubes Security Pack☆530Updated this week
- Qubes component: core-admin☆139Updated 2 weeks ago
- Hardware project of the Nitrokey Storage device☆40Updated last year
- Hacker OPSEC☆101Updated 7 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆862Updated 4 months ago
- TXT and PDF documents from the NSA☆188Updated 10 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆204Updated last week
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- My personal blog and website (see http://blog.invisiblethings.org/)☆63Updated this week
- Industry Working Group on Automated Cryptographic Algorithm Validation☆194Updated 2 months ago
- Encrypted Text Messaging☆148Updated 10 years ago
- A Camouflage Proxy for the Tor Anonymity System☆87Updated 10 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Updated 3 years ago
- Source code for my crackstation.net website.☆169Updated 4 years ago
- ☆206Updated 2 years ago