mweissbacher / armory-passLinks
Password manager for USB Armory
☆37Updated 10 years ago
Alternatives and similar repositories for armory-pass
Users that are interested in armory-pass are comparing it to the libraries listed below
Sorting:
- iSEC Partners' research publications☆76Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- ☆30Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- hid emulation tools for the usbarmory☆68Updated 9 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 11 months ago
- Repo for the paper "USB Devices phoning home"☆22Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- lte security☆42Updated 10 years ago
- Jump to Full Encryption☆61Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- ☆198Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- ☆31Updated 5 years ago
- ☆13Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated last month
- free crypto audit☆31Updated 8 years ago
- Syscall Firewalls for VM Isolation☆11Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago