q3k / httorrent
torrent -> http plumbing
☆24Updated 4 years ago
Alternatives and similar repositories for httorrent:
Users that are interested in httorrent are comparing it to the libraries listed below
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Pong revolution.☆13Updated 5 years ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Updated 5 years ago
- generate pgp keys with vanity fingerprints☆17Updated 8 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated 10 months ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Delicious Onion Service Wraps.☆23Updated 9 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆12Updated 6 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- A warrant canary system☆30Updated 6 years ago
- Traffic analysis resistant messaging with Qt based user interface☆30Updated last year
- Implementation of libsodium's secretstream in Go☆20Updated 3 weeks ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Run any command transparently in a VM (this repo isn't part of Cappsule)☆27Updated 7 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- The tools used for the DNS spies blog post☆49Updated 6 years ago
- dnsoverhttps - D'oh!☆14Updated 6 years ago
- The noise swiss army knife☆44Updated 4 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 5 months ago
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 5 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year
- Implementations of do255e and do255s in C and assembly☆25Updated 3 years ago
- tunnel traffic through a genuine bittorrent connection☆65Updated 5 years ago