paragonie-scott / asgard-clientLinks
The Authentic Software Guard
☆13Updated 9 years ago
Alternatives and similar repositories for asgard-client
Users that are interested in asgard-client are comparing it to the libraries listed below
Sorting:
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- Host files with DNS☆33Updated 9 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- WordPress Honeypot☆34Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 12 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- ☆30Updated 10 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- An advanced memory forensics framework☆25Updated 11 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 10 years ago
- Encrypted Text Messaging☆148Updated 9 years ago
- ☆12Updated 8 years ago
- Bandwidth authority scanner. This project is deprecated in favour of https://gitlab.torproject.org/tpo/network-health/sbws☆42Updated 3 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Script to add iptables rules (on a linux system) that force all traffic through tor☆38Updated 10 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Updated 9 years ago
- Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.☆49Updated 4 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- AVX2 Chacha implementation☆16Updated 12 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆67Updated 14 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- ☆32Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago