lojikil / chashaLinks
A Flask-like µFramework for Gopher
☆20Updated 5 months ago
Alternatives and similar repositories for chasha
Users that are interested in chasha are comparing it to the libraries listed below
Sorting:
- SECD machine and Lispkit Lisp compiler, in Python☆10Updated 8 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Encodes data into printable Unicode characters.☆90Updated 8 months ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 11 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 8 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- free crypto audit☆31Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- a grammar-based data generator☆60Updated 7 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- carML - a yummy and sweet ML dialect☆19Updated 4 years ago
- An android front-end to the zcash wallet through onion services☆14Updated 8 years ago
- Bootable 512 byte OS that is a game☆27Updated 6 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- A DOM-Inspired Ruby Smart Fuzzer☆56Updated 16 years ago
- Haxathon Supremacy Virtual Machine☆33Updated 8 years ago
- Introduction to using the Hammer parser construction toolkit by Meredith L. Patterson☆82Updated 8 years ago
- SECD microprocessor reimplementation in VHDL☆36Updated 6 years ago
- Sign and verify author signatures on git commits☆17Updated 11 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 10 years ago