Musictime is popcorntime for music.
☆10Sep 6, 2024Updated last year
Alternatives and similar repositories for musictime
Users that are interested in musictime are comparing it to the libraries listed below
Sorting:
- ☆10Jun 28, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- Makes it simple to create and destroy temporary containers in Mozilla Firefox.☆11Oct 30, 2025Updated 4 months ago
- Get advice for the best post-quantum cryptography algorithm for your use case☆17Feb 27, 2026Updated last week
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 7 months ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- A portfolio template designed using Materialize.☆10Oct 4, 2018Updated 7 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- This is a controller for the WE-R2.4 robot on Thingiverse.☆13Aug 19, 2019Updated 6 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- ☆12Mar 1, 2023Updated 3 years ago
- A sample CLI tool made in V that prints geometric shapes to the screen.☆11Dec 2, 2023Updated 2 years ago
- ☆16Nov 18, 2025Updated 3 months ago
- ☆10Jul 5, 2016Updated 9 years ago
- Spacecraft simulation.☆13Feb 26, 2026Updated last week
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 3 months ago
- chrome extension to make photobucket embeds work on third party sites☆10Oct 8, 2017Updated 8 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated 2 weeks ago
- Supplement Library for Introductory Programming Courses☆14Oct 4, 2023Updated 2 years ago
- problem: it's extremely difficult to keep up with everything happening within the Cardano ecosystem☆11Apr 25, 2019Updated 6 years ago
- A hands-on explanation of X25519 key exchange☆17Jul 25, 2025Updated 7 months ago
- A graph structure analysis and visualization tool for the are.na platform.☆12Sep 3, 2017Updated 8 years ago
- A bare-bones TypeScript Vue.js project with example webpack configuration that enables hot module reloading with .vue components and Type…☆13Aug 15, 2018Updated 7 years ago
- C11 implementation of FIPS 203 initial public draft.☆21May 16, 2024Updated last year
- A portable library implementing NIST SP 800-90A DRBGs☆18Nov 25, 2025Updated 3 months ago
- Telegram bot to retrieve the menu of the sv restaurant in zug (@FiveMoodsBot )☆10Apr 25, 2023Updated 2 years ago
- Pure Rust implementation of (draft) FIPS 203 Module-Lattice-based Key-Encapsulation Mechanism Standard for server, desktop, browser and e…☆17May 15, 2024Updated last year
- ☆16Updated this week
- Problem: staff are working but not solving problems☆15Mar 29, 2019Updated 6 years ago
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆12Oct 20, 2021Updated 4 years ago
- ☆13Jan 3, 2026Updated 2 months ago
- Inprocess : Installable version of FreeCAD OpenSCAD workbench☆16Feb 24, 2026Updated 2 weeks ago
- Small YouTube Audio Player☆13Apr 5, 2016Updated 9 years ago
- Implementation of the Covercrypt attributes based encryption algorithm☆22Feb 13, 2026Updated 3 weeks ago
- Just another AD training, but free.☆16Aug 9, 2025Updated 7 months ago