twosixlabs / coffeebreakLinks
☆25Updated 2 years ago
Alternatives and similar repositories for coffeebreak
Users that are interested in coffeebreak are comparing it to the libraries listed below
Sorting:
- This database tracks details about victims of NSO Group’s Pegasus spyware, based on reporting by Amnesty International, Citizen Lab, Forb…☆30Updated last year
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Updated 2 years ago
- ☆23Updated 2 years ago
- Privacy Enhancements for Android☆14Updated 4 years ago
- ☆81Updated 5 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 2 months ago
- ☆11Updated 4 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- trustor (PoC)☆25Updated 3 years ago
- Mirror only. Official repository at https://git.glasklar.is/system-transparency/core/system-transparency☆87Updated 2 months ago
- Open Sim Kit (OSK) is FOSS software for editing the content and functions of SIM cards.☆31Updated 11 years ago
- Rust bindings and key exchange for liboqs (Open Quantum Safe), a library for quantum-resistant cryptographic algorithms☆36Updated 4 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated last month
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- ☆26Updated 2 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- ☆113Updated last year
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- Checking that functions are constant time with Valgrind☆184Updated 8 years ago
- Off-The-Record Messaging protocol implementation for Python☆14Updated 2 months ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Subgraph pH☆12Updated 2 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆34Updated 3 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 8 years ago
- The formal proofs for iMessage PQ3 using the Tamarin Prover☆15Updated 2 months ago
- Minimal setup to trigger the xz backdoor☆28Updated 7 months ago
- ☆10Updated 6 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago