rchatterjee / nocrack
A new kind of password vault that fools the brute-force attacker by charning out decoy passwords.
☆26Updated 3 years ago
Alternatives and similar repositories for nocrack:
Users that are interested in nocrack are comparing it to the libraries listed below
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- ☆27Updated 3 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆54Updated 4 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- XPIR: Private Information Retrieval for Everyone☆117Updated 3 years ago
- Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)☆38Updated 4 years ago
- MaxBib is a BibTeX database containing papers related to user authentication.☆8Updated last month
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 8 years ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Updated 11 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- CoSi command line interface☆21Updated 8 years ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆177Updated last year
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 7 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆36Updated 4 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- Hunting for Sybils and anomalies in archived Tor network data.☆44Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 3 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- SGX command-line tools and paper☆146Updated 8 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆101Updated 3 months ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 7 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆20Updated 9 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆24Updated 9 months ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago