jedisct1 / ping
Pong revolution.
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for ping
- A DNS library for Rust.☆23Updated last year
- An init utility purely written in Rust.☆23Updated 6 years ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated last year
- Docker image: DNS over HTTPS proxy☆11Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated 8 months ago
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- (Oblivious) DoH Server☆27Updated 2 years ago
- A tool to extract code from individual functions in a library.☆15Updated 2 years ago
- Implementation of libsodium's secretstream in Go☆20Updated this week
- Painless Linux sandboxing API☆14Updated 5 months ago
- Cryptographic signing, ported from BSD for Linux, that uses instructions of modern CPUs☆24Updated 4 years ago
- Easy sandboxing for rust☆10Updated 8 years ago
- cut out a small (binary) piece of a (binary) file☆15Updated 13 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆18Updated 6 years ago
- A docker image to host one's DNS-over-HTTPS proxy☆27Updated 5 years ago
- ☆23Updated 2 months ago
- A little privilege escalator in Rust, for learning.☆13Updated 4 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆13Updated 6 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 3 months ago
- dnsoverhttps - D'oh!☆14Updated 6 years ago
- ☆19Updated 4 years ago
- Print core memory of a given a process ID (linux specific)☆10Updated 7 years ago
- A proof-of-concept for a read-only filesystem with random contents generated on demand.☆37Updated 3 years ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Go implementation of OpenBSD's signify(1)☆21Updated 4 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 6 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆34Updated 6 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 8 years ago
- BAT KEM/Signature Reference Implementation☆19Updated 2 years ago