shadow / tgenLinks
A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.
☆38Updated last year
Alternatives and similar repositories for tgen
Users that are interested in tgen are comparing it to the libraries listed below
Sorting:
- ipcrypt implementation in C☆33Updated 6 months ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Bootstrapping Secure Communication without Leaking Metadata☆77Updated 6 years ago
- Cryptography code examples using libsodium and mbedtls C libraries and Python cryptography and PyNaCl modules☆71Updated 5 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- C library that implements the OTR protocol.☆64Updated 9 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- A new implementation of OTR with support for version 4. This is a mirror of https://bugs.otr.im/otrv4/libotr-ng☆43Updated 3 years ago
- Reference implementations (software)☆85Updated 8 years ago
- The control panel for your cloud's memory☆35Updated 9 years ago
- CRYPTOGAMS distribution repository☆62Updated last month
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- ☆58Updated 8 years ago
- A memory-hard password hashing function.☆70Updated 2 years ago
- Plug-and-play IP rate limiter in C☆26Updated 2 months ago
- MPTCP firewall tester based on scapy☆49Updated 10 years ago
- Mirror of all PDFs from the IACR's eprint☆47Updated last year
- opmsg p2p transport network☆73Updated 7 years ago
- A really tiny crypto library.☆161Updated 6 months ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 5 years ago
- Cryptography library. X25519, Ed25519, qDSA, Elligator2, Ristretto, ChaCha20, Blake2, Poly1305, Scrypt, Noise protocol, File encryption i…☆34Updated 6 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 8 years ago
- opensnoop in pure C using eBPF☆102Updated 6 months ago
- A tweakable block cipher☆31Updated last year
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 4 years ago