mjosaarinen / dekryptize
A ncurses animation to make decryption look like, well, decryption.
☆241Updated 5 years ago
Alternatives and similar repositories for dekryptize:
Users that are interested in dekryptize are comparing it to the libraries listed below
- Bootable PDF CV☆228Updated 5 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆145Updated 4 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Blog-type notes about building Onion sites☆143Updated 7 years ago
- Trolling the Web of Trust☆42Updated 11 years ago
- Street Fighter MOTDs☆137Updated 8 years ago
- One-end encryption, stronger than end-to-end☆219Updated 2 years ago
- The ultimate underhanded dotfiles☆286Updated 3 years ago
- opmsg message encryption☆753Updated 2 years ago
- Listen to Tux's heartbeat with this awesome Linux Kernel Module☆57Updated 6 years ago
- 🔍 Colourful visualization tool for binary files☆542Updated last year
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆237Updated 9 years ago
- WiFi Tracker Confuser☆65Updated 7 years ago
- An asemic Markov-chained cipher☆203Updated 4 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆930Updated 2 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- ☆144Updated 8 years ago
- If you get pw3ned, might want to fix your shell☆197Updated 8 years ago
- hashpipe - pipe iff the hash matches☆407Updated 3 years ago
- ROCA: Infineon RSA key vulnerability☆486Updated last year
- A Go TLS/HTTPS server demo that uses a Yubikey as the backend for it's private key☆181Updated 7 years ago
- A tool for manipulating X windows☆353Updated 4 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆356Updated 2 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- A Linux shell script to improve your privacy online☆83Updated 9 years ago