kpcyrd / tr1pd
tamper resistant audit log
☆18Updated 6 years ago
Alternatives and similar repositories for tr1pd:
Users that are interested in tr1pd are comparing it to the libraries listed below
- A DNS library for Rust.☆23Updated 3 weeks ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- (Oblivious) DoH Server☆27Updated 2 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Toolset to analyse TLS datasets☆12Updated 5 years ago
- Universal guided editor and reverse engineering tool for binary data.☆11Updated 7 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- ☆35Updated 12 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Pong revolution.☆13Updated 5 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 6 months ago
- the puppy proxy☆22Updated 4 years ago
- Print core memory of a given a process ID (linux specific)☆11Updated 7 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Small container runtime for threat detection☆12Updated 3 years ago