A docker image to host one's DNS-over-HTTPS proxy
☆28Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for doh-docker
Users that are interested in doh-docker are comparing it to the libraries listed below
Sorting:
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- A repository of CAD files for 3D printable optical components.☆19Dec 12, 2017Updated 8 years ago
- ☆19Jul 13, 2020Updated 5 years ago
- ☆24Jan 21, 2022Updated 4 years ago
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆29Nov 21, 2023Updated 2 years ago
- A Python3 Implementation of LLL☆36Apr 29, 2021Updated 4 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Routino is an application for finding a route between two points using the dataset of topographical information collected by http://www.O…☆15Feb 17, 2012Updated 14 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- USB armory - boot loader☆39Feb 22, 2026Updated last week
- 0-ring rootkit revealer for Linux☆29Sep 5, 2019Updated 6 years ago
- ☆11Aug 10, 2022Updated 3 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- julia <3 clojure + macroexpansion☆11May 2, 2016Updated 9 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 7 months ago
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- Source code for Robonomics tutorials☆11Dec 10, 2022Updated 3 years ago
- Bot software for creating Wikipedia articles using geographical data☆10Feb 28, 2017Updated 9 years ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated 3 weeks ago
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- Cryptographic Asymmetric Secure Storage Infrastructure☆10Jan 6, 2023Updated 3 years ago
- FAQ about the business side of quantum computing aimed at researchers in academia.☆10Sep 7, 2020Updated 5 years ago
- A lookup table for the discrete log in secp265k1☆23Feb 27, 2021Updated 5 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- A Ruby gem that calculates Gematria☆10Mar 15, 2013Updated 12 years ago
- libsodium for Ada - A secure cryptographic library☆10Jul 18, 2016Updated 9 years ago
- some p2p thing☆11Nov 20, 2016Updated 9 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- A tiny program to solve the thousand captcha image for testing the quality of the OCR. (Optical character recognition)☆13Aug 3, 2019Updated 6 years ago
- work in progress port of n64decomp/perfect_dark to modern platforms☆12Jan 21, 2026Updated last month
- Fast line iteration library written in Rust☆14May 28, 2017Updated 8 years ago
- Tamper resistant, off-site audit logging for WordPress☆14Jan 14, 2026Updated last month
- Guide for setting up the guardian node for the guardian testnet☆15Jul 8, 2020Updated 5 years ago
- ☆10Jan 29, 2025Updated last year
- Material for PARI/GP: new functions, some scripts, and syntax highlighting.☆11Oct 2, 2023Updated 2 years ago