samuel-lucas6 / Cryptography-GuidelinesLinks
Guidance on implementing cryptography as a developer.
β429Updated 2 years ago
Alternatives and similar repositories for Cryptography-Guidelines
Users that are interested in Cryptography-Guidelines are comparing it to the libraries listed below
Sorting:
- Is Windows a joke or are you? π§’β250Updated 2 years ago
- Entropy is a CLI tool that will scan your codebase for high entropy lines, which are often secrets.β709Updated 4 months ago
- Shell utility to interactively select lines from stdinβ156Updated last year
- Management of multiple Git SSH keys made easyβ251Updated last year
- A command-line secret manager for developers, sysadmins, and devops.β163Updated last year
- High-performance JSON to GRON (greppable, flattened JSON) converterβ642Updated last year
- A commands bookmark for shells πβ351Updated 2 months ago
- Simple and powerful progress time estimation (ETA) for JavaScriptβ117Updated 7 months ago
- Secure secret sharing through the browser using web crypto. No server required!β212Updated last year
- How to become a packagerβ283Updated last month
- β258Updated 2 years ago
- a simple password manager. encryption via age, written in portable posix shellβ536Updated this week
- Mycelite is a SQLite extension that allows you to synchronize changes from one instance of SQLite to another.β1,090Updated last year
- Pipelined Query Languageβ674Updated 7 months ago
- Stress-test your database with pre-defined queriesβ441Updated last year
- Experimental Java implementation of post-quantum crypto algorithm Dilithium (including JCE provider)β194Updated last year
- I hold the opinion that state machines are underratedβ731Updated last year
- Publish from GitHub Actions using multi-factor authenticationβ288Updated 2 months ago
- Here I share my mental model of software engineering and related stuff.β39Updated 2 years ago
- sysm makes your system play custom sounds when any configured system or external event happensβ215Updated last week
- See all the files you have ever touched in a Git repoβ244Updated 7 months ago
- command line codespelunker or code searchβ541Updated last year
- Paper-based Secret Sharing Techniqueβ441Updated last year
- β517Updated last year
- Migrate from Docker to Podman.β374Updated 4 months ago
- A series of top performing Text to SQL LLMsβ866Updated last year
- Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so thβ¦β549Updated this week
- A SQLite extension that brings column-oriented tables to SQLiteβ671Updated last year
- Visual tool to explore SQLite databases page-by-page, the way they're stored on disk and the way SQLite sees them.β630Updated 8 months ago
- Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain β¦β1,234Updated last year