Computer Security Class - Department of Informatics and Telecommunications, University of Athens
☆12Feb 22, 2017Updated 9 years ago
Alternatives and similar repositories for computer-security-class
Users that are interested in computer-security-class are comparing it to the libraries listed below
Sorting:
- A forum for programming support among Di members☆17Oct 25, 2022Updated 3 years ago
- A set of efficient data structures in C, created in a generic way☆43Oct 3, 2023Updated 2 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Principles and specific tips for easier decision making and living a good life☆12Sep 24, 2024Updated last year
- A cryptographic method that defends against side-channel attacks☆25Nov 7, 2016Updated 9 years ago
- Established in 2018, our team aims to bring together machine learning enthusiasts to explore the fundamentals and trends of machine learn…☆23Mar 29, 2021Updated 4 years ago
- A tiny demo iOS app using SSL pinning to block HTTPS MitM interception☆18Jan 23, 2024Updated 2 years ago
- Working group for a standard liquid staking module for Cosmos Chain☆14Jan 17, 2022Updated 4 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 8 years ago
- Profile Solidity gas consumption line-wise.☆23Jun 1, 2021Updated 4 years ago
- ☆19Oct 20, 2022Updated 3 years ago
- A set of templates for different academic venues.☆29Jun 18, 2019Updated 6 years ago
- 🌃 Start and control a Tor instance.☆12Apr 9, 2022Updated 3 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- Pacman AI Projects 1,2,3 - UC Berkeley☆11Mar 5, 2023Updated 3 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Interpreter for a simple imperative language called IPL☆13Mar 15, 2023Updated 3 years ago
- "Blockchain Foundations" lecture notes☆26Updated this week
- 6.858 Computer Systems Security: Lecture notes (edited a little and formatted with Markdown)☆49Feb 26, 2018Updated 8 years ago
- Full implementation of SmartOTPs: An air-gapped 2-factor authentication for smart-contract wallets.☆13Feb 23, 2026Updated 3 weeks ago
- A high-level wrapper around BCoin☆25Dec 22, 2015Updated 10 years ago
- A Python-module to provide an API to KeePass 1.x files commonly used by KeePassX.☆29Dec 10, 2018Updated 7 years ago
- Contract to record hashes of recent and historic blocks☆14Sep 28, 2015Updated 10 years ago
- Currently supports HIPAA and NIST controls.☆17Feb 23, 2022Updated 4 years ago
- #HackingTogether☆14Jan 23, 2017Updated 9 years ago
- DKG for BLS threshold signature scheme on the EVM using solidity☆32Jan 13, 2019Updated 7 years ago
- An all-in-one solution for proving that a beacon block is a predecessor of another beacon block.☆17Sep 10, 2024Updated last year
- ☆16Nov 4, 2019Updated 6 years ago
- Proof of Assets (PoA) is a scheme designed to let entitites (operators) prove that they control a given amount of Bitcoin or other blockc…☆27Nov 16, 2015Updated 10 years ago
- MIPS assembly and examples by students of DIT, University Of Athens.☆18Sep 24, 2022Updated 3 years ago
- A terminal implementation of the game Quoridor with an engine☆10Apr 24, 2023Updated 2 years ago
- Find MAC addresses of devices leaving any sort of trace in the air around you☆12Mar 26, 2015Updated 10 years ago
- A LaTeX document class to create small hand-outs (flyers)☆13Mar 12, 2024Updated 2 years ago
- ☆13Jan 28, 2017Updated 9 years ago
- Unit-by-unit solutions for the ES6 tutorial☆18Apr 4, 2017Updated 8 years ago
- Tendermint Implementation of pStake☆19Dec 1, 2025Updated 3 months ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 3 years ago
- implementation of the stream data structure in php☆26Oct 10, 2011Updated 14 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago