stribika / bfkdfLinks
Brainfuck Key Derivation Function
☆30Updated 11 years ago
Alternatives and similar repositories for bfkdf
Users that are interested in bfkdf are comparing it to the libraries listed below
Sorting:
- salty privacy☆52Updated 5 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 9 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆40Updated 9 years ago
- PGP packet parser library☆55Updated 6 years ago
- The "State considered harmful" paper☆109Updated 10 years ago
- Yet another signify tool☆92Updated last year
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- DHCP client disclosing less identifying information.☆61Updated 5 years ago
- Portable, light-weight ircd written in Go.☆52Updated 8 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- Use BIOS ram hacks to make a SSH server out of any INT 10 13h app (MS-DOS is one of those)☆148Updated 10 years ago
- A Polymorphic Engine for Filtering-Resistant Transport Protocols☆289Updated 2 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- You can't handle the truth☆52Updated 4 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- Superfast Line Counter☆51Updated 4 years ago
- "control-port-filter" without the bash☆14Updated 9 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 10 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- Use some TLS servers for trusted timestamping☆42Updated 10 years ago
- Lazy man's, user-mode union file system☆31Updated 10 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- Configuration to use gpg smartcards for ssh authentication☆112Updated 5 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 6 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆35Updated 7 years ago
- An evil teddy bear that steals your secrets☆38Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago