rprinz08 / StickLockLinks
Use YubiKeys (or other security tokens) like a physical key
☆18Updated 6 years ago
Alternatives and similar repositories for StickLock
Users that are interested in StickLock are comparing it to the libraries listed below
Sorting:
- Libraries for OnlyKey Firmware☆31Updated last year
- A command line C app to validate HOTP codes on Heads☆11Updated 9 months ago
- Cooperative RSA signing☆26Updated 5 years ago
- Java Card implementation of the OpenPGP smart card☆70Updated 2 years ago
- **Abandoned** Tomu+ board - no longer under development!☆14Updated 7 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated 2 years ago
- Quick setup tutorial on how to set up toolchain & build Javacard applets.☆44Updated 5 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwares☆50Updated 6 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆16Updated 2 years ago
- Website to easily update Solo firmware on keys.☆32Updated 4 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆34Updated 7 years ago
- The world's easiest TRNG to get right☆149Updated 5 months ago
- Sphinx-based Password Storage low-level library☆129Updated 8 months ago
- BusKill kill cord for Linux☆35Updated 5 years ago
- C implementation of Elligator 2 for Curve25519☆30Updated 4 years ago
- L2TPv3 VPN tunneling solution☆74Updated 2 years ago
- The OnlyKey Python Command-Line Utility is a command line tool targeted towards more advanced users. This can be used for configuration a…☆51Updated 2 years ago
- Proof of concept for using Yubikey NEO in a PIV physical access control application☆20Updated 9 years ago
- Desktop app for customizing and updating your Solo.☆74Updated 2 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 5 years ago
- Authentication with PKCS#11 modules☆28Updated last year
- Good-enough Hex Editor/Annotator☆24Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 7 years ago
- Repository of now harmless TREZOR security exploits☆11Updated 10 years ago
- Unofficial gnuk mirror of http://www.fsij.org/category/gnuk.html☆11Updated 7 years ago
- ☆82Updated 5 years ago
- A collection of mesh routing protocols.☆25Updated 3 months ago
- Deterministic execution virtual machine sandbox for Moxie arch☆78Updated 5 years ago
- NFC monitor daemon which is able to launch modules (libraries) on action (tag inserted or removed)☆34Updated 6 years ago
- The OnlyKey App is used for the initial setup and configuration of OnlyKey. Supported on Windows, macOS, Linux, and Chromebook (with Chro…☆114Updated last month