tuxxy / hazmat-mathLinks
Hazmat ECC arithmetic for Cryptography.io
☆28Updated 5 years ago
Alternatives and similar repositories for hazmat-math
Users that are interested in hazmat-math are comparing it to the libraries listed below
Sorting:
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- ☆29Updated 2 years ago
- A chrome extension that enables automatic encrypting and decryption of GPG messages over the web☆18Updated 9 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- ☆97Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- Reproducing images using hex values☆28Updated 7 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 9 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- Simple interactive breakpoint library with with automatic variable injection.☆61Updated 6 years ago
- MCVirt - Command line virtual machine management utility☆24Updated 4 years ago
- Search engine with a static webserver☆67Updated 3 years ago
- Chair and the Key☆64Updated 9 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 7 years ago
- Schrödinger's Tcl☆30Updated 10 years ago
- ☆80Updated 8 years ago
- Programmable Dropbox for secure IoT☆70Updated 8 years ago
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 8 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆65Updated 7 years ago
- How to create a PokemonGo-style app in plain Javascript☆28Updated 8 years ago
- Escrovery - Decentralized Account Recovery With Escrowed Payments☆13Updated 6 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- [Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.☆30Updated 7 years ago
- A steganography tool for text☆90Updated 3 weeks ago
- Configures a regular ubuntu server to run as a tor hidden server running apache utilising ansible☆41Updated 6 years ago
- ☆89Updated 9 years ago
- Peer-to-peer for shell scripts.☆38Updated 5 years ago
- A set of PS4 experiments using the WebKit exploit☆83Updated 9 years ago