jedisct1 / pingLinks
Pong revolution.
☆16Updated last month
Alternatives and similar repositories for ping
Users that are interested in ping are comparing it to the libraries listed below
Sorting:
- An init utility purely written in Rust.☆26Updated 7 years ago
- A tweakable block cipher☆31Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 7 months ago
- A proof-of-concept for a read-only filesystem with random contents generated on demand.☆39Updated 4 years ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- 🐲 separate user on windows + firejail on linux + sandbox-exec on macOS☆21Updated 5 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- A DNS library for Rust.☆23Updated 8 months ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 9 months ago
- ☆19Updated 5 years ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆41Updated 2 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- tamper resistant audit log☆18Updated 7 years ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆36Updated 2 years ago
- A cache hard password hash/KDF☆48Updated last year
- Label-based networking daemon☆23Updated 6 years ago
- sign elf binaries with GPG☆17Updated 9 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- A secure utmp/wtmp implementation☆19Updated last month
- PGP key poisoner☆37Updated 5 years ago
- Proof-of-Concept Linux kernel module to export kernel APIs over kernel device nodes☆31Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Passively track hosts in local network☆52Updated 2 years ago
- Cryptographic signing, ported from BSD for Linux, that uses instructions of modern CPUs☆24Updated 5 years ago
- self extracting tar archives☆21Updated 8 years ago
- Simple yet powerful webhooks catcher☆18Updated 2 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago