jetperch / pymonocypher
Python bindings for Monocypher crypto library.
☆15Updated 2 months ago
Alternatives and similar repositories for pymonocypher:
Users that are interested in pymonocypher are comparing it to the libraries listed below
- An idiomatic C++ wrapper for the Monocypher crypto library☆11Updated 3 months ago
- Some useful LD_PRELOAD libraries☆11Updated 2 years ago
- 100% XXTEA authenticated, chunked file encryption☆17Updated 3 years ago
- A minimalist svn client to checkout/update Subversion repositories.☆12Updated last year
- POSIX-overlay filesystem☆14Updated 7 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- A minimal, resource-friendly syslog daemon for embedded Linux☆27Updated last year
- Linux fork of FreeBSD crunch☆16Updated 12 years ago
- A readline C and C++ REPL with history, tab-completion, and undo.☆19Updated 5 months ago
- Simple 16-bit x86 decompression algorithm☆13Updated 7 years ago
- Custom PSP app framework☆15Updated 3 years ago
- Standalone portable header-based implementation of FORTIFY_SOURCE=3☆21Updated 2 months ago
- RFC8484 and DoH/JSON resolver☆40Updated last year
- Python library to read Squashfs image files.☆51Updated 8 months ago
- Piler for running C in the shell☆18Updated 6 months ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆33Updated 7 months ago
- Take actions when specific devices appear/disappear from your LAN☆16Updated last year
- Upstream eglibc + xilinx branches☆15Updated 11 years ago
- Pascal to C translator☆11Updated 4 years ago
- BearSSL with some bits [see branch upstream for upstream]☆27Updated 8 years ago
- IPv4 / IPv6 stack (with http-, vnc-, sip-, snmp-, mqtt- and ntp server) which runs in userspace on linux, written in c++☆14Updated 7 months ago
- A secure utmp/wtmp implementation☆17Updated 3 months ago
- Tool and library for generating X.509 certificates and certificate requests (mirror)☆16Updated 3 years ago
- Linux userspace Networking Stack☆14Updated 7 years ago
- Historic password hashing algorithms☆18Updated 4 years ago
- Dump sections or program entries from a ELF file☆21Updated 8 years ago
- Tools used to make the SHA-1 collision detection library☆12Updated 7 years ago
- Turns virtual usbredir connections into physical ones☆11Updated 4 years ago
- Manipulate tar file metadata, list tar files or convert tar to cpio. For some projects, this can replace fakeroot and cpio, when creating…☆32Updated 5 months ago