stribika / bfkdf
Brainfuck Key Derivation Function
☆30Updated 10 years ago
Alternatives and similar repositories for bfkdf:
Users that are interested in bfkdf are comparing it to the libraries listed below
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆40Updated 8 years ago
- C library that implements the OTR protocol.☆61Updated 8 years ago
- ☆9Updated 8 years ago
- salty privacy☆52Updated 4 years ago
- network notary implementation for the Perspectives project☆50Updated 8 years ago
- PGP packet parser library☆56Updated 5 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- torbsd web pages☆13Updated 6 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- Decentralised gossip driven data sharing for the 21st century.☆59Updated last year
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 9 years ago
- ☆36Updated 9 years ago
- PEFS - stacked cryptographic file system for FreeBSD☆76Updated last year
- Repository of maintained OZ profiles and seccomp filters.☆14Updated 7 years ago
- BSD-licensed C99/POSIX library code shared between tarsnap, scrypt, kivaloo, spiped, and bsdiff.☆112Updated last week
- Trolling the Web of Trust☆42Updated 10 years ago
- Project is now superseded by CoreFreq☆47Updated 7 years ago
- FUSE-based bittorrent file system (also called torrentfs or torrent filesystem) for streaming content directly from the internets.☆71Updated 13 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Abusing U2F to 'store' a stable secret☆16Updated 9 years ago
- You can't handle the truth☆51Updated 4 years ago
- "control-port-filter" without the bash☆15Updated 8 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- The "State considered harmful" paper☆106Updated 9 years ago
- Two programs, which can be used for OS/application leap second immunity verification.☆28Updated 9 years ago
- "What if I tossed small pox into a room filled with sprinters after filling their water cups with red bull."☆33Updated 9 years ago
- OpenBSD ports tree version scanner☆17Updated 3 years ago
- A library that allows processes to waive their rights☆27Updated 9 years ago