michenriksen / dicewareLinks
Generate secure passphrases with the Diceware method
☆60Updated 10 years ago
Alternatives and similar repositories for diceware
Users that are interested in diceware are comparing it to the libraries listed below
Sorting:
- You'll Never Take Me Alive!☆233Updated 9 years ago
- CLI for keybase.io written in/for Node.js☆300Updated 8 years ago
- Check if a website has weak SHA-1 TLS certificates.☆208Updated 4 years ago
- Blockfinder enumerates network information for countries☆128Updated 2 years ago
- Replicating Encrypted PasteBin☆75Updated 7 years ago
- Makes generating machine-readable, digitally signed warrant canary statements simpler☆147Updated 5 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- Re-decentralize email. Make it secure. Make it simple. Make it yours.☆48Updated 10 years ago
- Cross-platform GUI for the Tarsnap backup service.☆254Updated 7 months ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- udev rules and helpful programs to defend your system☆22Updated 12 years ago
- An initiative to decentralize public PGP keys.☆56Updated 9 years ago
- A docker'ized internal-only tor relay.☆41Updated 9 years ago
- Slack client used to encrypt/decrypt and send/receive Keybase PGP messages through a Slack private group.☆59Updated 9 years ago
- NOISE creates "real-looking" text based upon a collection of reference texts, which can then be used in emails, tweets, web searches, IRC…☆15Updated 10 years ago
- PrivacyFox tweaks various preferences in Firefox in order to enhance the privacy of users; it will also try to enforce these changes to m…☆154Updated 8 years ago
- ☆38Updated 10 years ago
- Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance☆354Updated 5 years ago
- ☆123Updated 5 years ago
- Encrypt Email using GnuPG and a pipe☆79Updated 9 years ago
- An installer/updater for the node client.☆117Updated 9 years ago
- An Ansible role for using tor!☆72Updated 9 years ago
- HTTPS Everywhere rulesets for hidden services and eepsites.☆168Updated 7 years ago
- Easy creation of Tor Hidden Services☆40Updated 10 years ago
- Generate Tor vanity onions with Go.☆25Updated 7 years ago
- Command-line utility to control Tor.☆89Updated last year
- Easy GnuPG key generation tool.☆62Updated 6 years ago
- A simple way of exposing any docker container as a tor hidden service☆29Updated 10 years ago
- A monitoring service for Certificate Transparency☆32Updated 2 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago