samuel-lucas6 / Cryptography-GuidelinesLinks
Guidance on implementing cryptography as a developer.
☆437Updated 3 years ago
Alternatives and similar repositories for Cryptography-Guidelines
Users that are interested in Cryptography-Guidelines are comparing it to the libraries listed below
Sorting:
- Entropy is a CLI tool that will scan your codebase for high entropy lines, which are often secrets.☆732Updated 10 months ago
- A command-line secret manager for developers, sysadmins, and devops.☆164Updated last year
- Is Windows a joke or are you? 🧢☆249Updated 2 years ago
- Management of multiple Git SSH keys made easy☆251Updated 5 months ago
- High-performance JSON to GRON (greppable, flattened JSON) converter☆659Updated 2 years ago
- Shell utility to interactively select lines from stdin☆155Updated 2 years ago
- Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so th…☆555Updated last week
- ☆512Updated last year
- A commands bookmark for shells 🔖☆352Updated 9 months ago
- Stress-test your database with pre-defined queries☆441Updated last year
- How to become a packager☆287Updated 7 months ago
- Mycelite is a SQLite extension that allows you to synchronize changes from one instance of SQLite to another.☆1,095Updated 2 years ago
- Secure secret sharing through the browser using web crypto. No server required!☆218Updated 2 years ago
- Simple and powerful progress time estimation (ETA) for JavaScript☆119Updated last year
- ☆258Updated 3 years ago
- Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain …☆1,243Updated last year
- A collection of script depicting the strange quirks of programming languages.☆620Updated last year
- I hold the opinion that state machines are underrated☆730Updated 2 years ago
- Experimental Java implementation of post-quantum crypto algorithm Dilithium (including JCE provider)☆198Updated 2 years ago
- vet is a command-line tool that acts as a safety net for the risky curl | bash pattern. It lets you inspect, diff against previous versio…☆977Updated 5 months ago
- A web fuzzer using the httpipe format☆98Updated last year
- a simple password manager. encryption via age, written in portable posix shell☆553Updated last month
- See all the files you have ever touched in a Git repo☆241Updated 2 months ago
- Pipelined Query Language☆692Updated last year
- Visualise a git repository by diff activity☆1,029Updated last year
- sysm makes your system play custom sounds when any configured system or external event happens☆214Updated 4 months ago
- Publish from GitHub Actions using multi-factor authentication☆295Updated 6 months ago
- An opensource incident management platform integrating with Slack.☆558Updated last year
- Paper-based Secret Sharing Technique☆444Updated 2 years ago
- Simple way to manage your remote machines and SSH keys☆756Updated last year