jdukes / pykeyctl
A python wrapper around keyctl
☆11Updated 8 years ago
Alternatives and similar repositories for pykeyctl:
Users that are interested in pykeyctl are comparing it to the libraries listed below
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- LD_PRELOAD hack to redirect connections to other ports☆43Updated 9 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆207Updated last year
- Freely available cryptographic iconography☆66Updated 8 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆104Updated 4 years ago
- Does your library check TLS certificates properly?☆79Updated last year
- Hackers in yo' kernel!☆59Updated 10 years ago
- DWiki is the file based wiki-thing that Chris Siebenmann uses for his blogs. It's written in a pile of Python.☆50Updated 9 months ago
- Jump to Full Encryption☆61Updated 8 years ago
- Go bindings for libkeyutils. Store secrets in the Linux keyring.☆9Updated 9 years ago
- ☆18Updated 8 years ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- network notary implementation for the Perspectives project☆50Updated 8 years ago
- The "State considered harmful" paper☆106Updated 9 years ago
- A collection of mind fucking trolling hacks☆75Updated 8 years ago
- uclibc build environment for predictable and repeatable building of binary packages☆56Updated 8 years ago
- Extended verification for git tags☆133Updated 2 years ago
- Threat Specification Language☆28Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- TLS labs☆30Updated 5 years ago
- Qubes component: antievilmaid☆146Updated 8 months ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Configuration to use gpg smartcards for ssh authentication☆111Updated 4 years ago
- X.509 certificate linter☆156Updated 5 years ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago