quickbundle / hackingLinks
☆12Updated 9 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- ☆17Updated 11 years ago
- free crypto audit☆31Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- Zero Knowledge Messaging☆17Updated 5 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 10 years ago
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 10 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 10 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- ☆56Updated 9 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Mirror of all PDFs from the IACR's eprint☆47Updated last year
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Updated 11 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- List of penetration testing tools.☆23Updated 5 years ago