misc stuff
☆19Jun 1, 2017Updated 8 years ago
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Sep 29, 2021Updated 4 years ago
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆18Sep 18, 2015Updated 10 years ago
- Go package spipe implements spiped protocol for creating symmetrically encrypted and authenticated connections.☆21Dec 11, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- Abusing U2F to 'store' a stable secret☆15Nov 23, 2015Updated 10 years ago
- retrobob is a retro gaming emulator that runs directly on your browser. Super Nintendo, NES/Famicom, Gameboy and Gameboy Color are curren…☆11Mar 25, 2024Updated 2 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics☆12Nov 20, 2024Updated last year
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- A flyer we provide to every visitor of the Grazer Linuxtage☆14Nov 28, 2021Updated 4 years ago
- An autogenerated docker engine api library for Elixir, generated from the OpenAPI spec☆16Sep 30, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- tunnel traffic through a genuine bittorrent connection☆66Sep 30, 2019Updated 6 years ago
- Secure multiparty messaging (kindof)☆21Jun 2, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- grabs letterboxd watchlist and turns it into a rss feed of torrent magnet links.☆19Dec 4, 2015Updated 10 years ago
- ☆13May 9, 2017Updated 9 years ago
- Implementation of the CL signature scheme☆24Nov 10, 2016Updated 9 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Jan 16, 2018Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆55Oct 2, 2025Updated 7 months ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- Novel polynomial basis for a reed solomon encoder☆38Feb 5, 2024Updated 2 years ago
- ☆16May 17, 2018Updated 8 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Caddy module: dns.providers.powerdns☆27Oct 18, 2025Updated 7 months ago
- The Tahoe-LAFS decentralized secure filesystem.☆16Aug 27, 2025Updated 8 months ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆19Apr 19, 2016Updated 10 years ago
- An introductory tutorial for the Coq proof assistant.☆10Feb 5, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Nov 13, 2023Updated 2 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 11 years ago
- ☆14May 3, 2019Updated 7 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- A simple libp2p DHT crawler☆16Jan 6, 2022Updated 4 years ago
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- ☆24Jan 21, 2022Updated 4 years ago