openwall / tcbLinks
Alternative password shadowing scheme
☆10Updated 3 weeks ago
Alternatives and similar repositories for tcb
Users that are interested in tcb are comparing it to the libraries listed below
Sorting:
- A LLVM-based toolchain for Linux designed to build a portable osquery☆40Updated last year
- Test Suite for John the Ripper☆25Updated 3 years ago
- tcpslice concatenates multiple pcap files together, or extracts time slices from one or more pcap files.☆81Updated last month
- A DNS library for Rust.☆23Updated 8 months ago
- NAT probing toolkit.☆22Updated 5 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆20Updated 7 years ago
- socat version 2☆10Updated 13 years ago
- Package apfs implements an Apple File System(apfs) bindings for Go☆37Updated 4 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 5 years ago
- Fork of proxychains with support of multiple chains. Chains are selected according to filters assigned to them.☆18Updated 12 years ago
- x86info : x86 processor register decoder.☆46Updated 7 months ago
- fork of Darkstat network traffic monitor (https://unix4lyfe.org/darkstat/)☆15Updated 10 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- Utility for displaying which compiler was used for creating an ELF file + basic info☆25Updated 8 months ago
- A simple, self-contained regression test suite for the Linux Kernel's audit subsystem☆24Updated last week
- ☆48Updated 11 months ago
- cut out a small (binary) piece of a (binary) file☆15Updated 14 years ago
- Sample programs demonstrating how to program in C using the Sockets API.☆39Updated last year
- A tiny DNS server that returns the client (resolver) IP☆28Updated 4 months ago
- sign elf binaries with GPG☆17Updated 9 years ago
- The standard lockfile library. Debian packaging is at https://github.com/miquels/liblockfile-debian.☆14Updated 2 years ago
- experiments in linux sandbox stuff☆25Updated 10 years ago
- Execute binaries from pipes, stdin and ttys☆77Updated last year
- Detect compiler names and versions from ELF files☆27Updated 7 months ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆24Updated 4 years ago
- SpamPD - Spam Proxy Daemon. A spam-filtering SMTP/LMTP proxy server using SpamAssassin in Perl. Since 2002.☆37Updated 3 months ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 9 months ago
- Ipsumdump and other programs for command-line network trace manipulation.☆39Updated last year