rmmh / abbrase
password generation based on abbreviating phrases made with markov chains
☆151Updated 4 years ago
Alternatives and similar repositories for abbrase:
Users that are interested in abbrase are comparing it to the libraries listed below
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- Replicating Encrypted PasteBin☆75Updated 7 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- Blog-type notes about building Onion sites☆143Updated 7 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Certification Authority Trust Tracker☆125Updated 7 years ago
- Minimal composite ad-blocking hosts file generator☆49Updated 7 years ago
- Generate RSA keypairs containing an arbitrary string in the public key.☆45Updated 2 years ago
- ☆56Updated 7 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Does your library check TLS certificates properly?☆78Updated last year
- Send encrypted secrets. Fluidkeys lets you send passwords, keys and personal information from the terminal. Powered by OpenPGP end-to-end…☆74Updated 5 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- Helpful utilities and documentation for Free Software live audio/video streaming☆77Updated 10 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆78Updated 6 years ago
- ☆33Updated 8 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆25Updated 9 years ago
- network notary implementation for the Perspectives project☆50Updated 8 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- Cleans out "open" wireless connections from OSX machine☆152Updated 4 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 6 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- a grep -r for secrets☆178Updated 2 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago