List of crackpot 'scientists' and 'thinkers'
☆20Jun 22, 2025Updated 9 months ago
Alternatives and similar repositories for crackpots
Users that are interested in crackpots are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 6, 2023Updated 2 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- repository for tracking open tasks☆17Dec 15, 2017Updated 8 years ago
- The BlackAlps 2019 badge☆10Dec 4, 2021Updated 4 years ago
- C library of Teserakt's E4 end-to-end security protocol☆15Feb 29, 2020Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- 2D-Doc parser library☆15Jan 11, 2026Updated 2 months ago
- Simple homomorphic encryption based on Paillier cryptosystem implementation in Go. Supports floating point numbers, addition, subtraction…☆10Nov 13, 2022Updated 3 years ago
- A lookup table for the discrete log in secp265k1☆23Feb 27, 2021Updated 5 years ago
- ☆11May 28, 2024Updated last year
- E4's C2 server☆21Oct 12, 2020Updated 5 years ago
- The CYC1000 is the next generation of Arrow’s FPGA IoT/Maker boards based on the latest Intel FPGA family Cyclone 10 LP.☆10Jan 27, 2022Updated 4 years ago
- The purpose of this document is to gather public information on vulnerabilities introduced on Blockchains software.☆14Nov 13, 2019Updated 6 years ago
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆21Oct 3, 2021Updated 4 years ago
- Very fast cryptographic hashing for large messages.☆69Mar 11, 2025Updated last year
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- Deterministic key generation for Go.☆22Jan 14, 2026Updated 2 months ago
- ☆13Sep 14, 2022Updated 3 years ago
- Rust library for accumulation schemes☆25Jan 24, 2023Updated 3 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- A library for pairing based cryptography☆31Mar 19, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆31Updated this week
- A 3D printed, case for the Sofle v2.0w keyboard☆15Jul 22, 2023Updated 2 years ago
- Binary merkle tree implementation.☆17Aug 31, 2019Updated 6 years ago
- a Private Publish Subscribe System☆52May 4, 2024Updated last year
- C/C++ header dependency list generator. Output can be used to create a dependency graph.☆14Apr 13, 2021Updated 4 years ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- (Keep It) Simple Stupid Database☆10Jul 16, 2017Updated 8 years ago
- Using SGX to harden password hashing☆34Jan 17, 2016Updated 10 years ago
- Go API client for arxiv.org☆20Feb 22, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The public repository for all smart contracts used by Aktionariat.☆17Feb 23, 2026Updated last month
- A VHDL implementation of SipHash☆13Feb 19, 2015Updated 11 years ago
- A js library for confidential web3 calls☆37Apr 26, 2023Updated 2 years ago
- An awesome and comprehensive list of LLM Securtiy Startups.☆15Nov 9, 2024Updated last year
- MiFare Classic 1k Smart Card MFOC Nested Attack☆15Feb 8, 2018Updated 8 years ago
- A specification pattern for consistent AI code generation.☆58Feb 16, 2026Updated last month
- Deployments of fancy cryptography☆222Feb 26, 2026Updated last month