samuel-lucas6 / Cryptography-GuidelinesLinks
Guidance on implementing cryptography as a developer.
☆434Updated 2 years ago
Alternatives and similar repositories for Cryptography-Guidelines
Users that are interested in Cryptography-Guidelines are comparing it to the libraries listed below
Sorting:
- Entropy is a CLI tool that will scan your codebase for high entropy lines, which are often secrets.☆713Updated 7 months ago
- A command-line secret manager for developers, sysadmins, and devops.☆164Updated last year
- High-performance JSON to GRON (greppable, flattened JSON) converter☆649Updated last year
- Shell utility to interactively select lines from stdin☆154Updated last year
- Is Windows a joke or are you? 🧢☆249Updated 2 years ago
- Management of multiple Git SSH keys made easy☆251Updated 2 months ago
- Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so th…☆550Updated this week
- A commands bookmark for shells 🔖☆351Updated 5 months ago
- Secure secret sharing through the browser using web crypto. No server required!☆214Updated last year
- ☆259Updated 2 years ago
- sysm makes your system play custom sounds when any configured system or external event happens☆216Updated last month
- vet is a command-line tool that acts as a safety net for the risky curl | bash pattern. It lets you inspect, diff against previous versio…☆963Updated 2 months ago
- How to become a packager☆285Updated 3 months ago
- Stress-test your database with pre-defined queries☆440Updated last year
- a simple password manager. encryption via age, written in portable posix shell☆541Updated this week
- ☆515Updated last year
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆383Updated last year
- Simple and powerful progress time estimation (ETA) for JavaScript☆119Updated 10 months ago
- Experimental Java implementation of post-quantum crypto algorithm Dilithium (including JCE provider)☆196Updated last year
- command line codespelunker or code search☆542Updated 3 weeks ago
- Mycelite is a SQLite extension that allows you to synchronize changes from one instance of SQLite to another.☆1,091Updated 2 years ago
- Paper-based Secret Sharing Technique☆442Updated last year
- See all the files you have ever touched in a Git repo☆245Updated 9 months ago
- A highly configurable Linux-based desktop notifier for RSS/Atom feeds.☆83Updated last year
- Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain …☆1,236Updated last year
- An ergonomic and safe syscall interception framework for Linux.☆631Updated last month
- I hold the opinion that state machines are underrated☆730Updated last year
- Simple way to manage your remote machines and SSH keys☆755Updated last year
- TCP proxy for simulating variable, yet predictable network latency☆1,544Updated last year
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆557Updated last month