misc stuff
☆19Jun 1, 2017Updated 8 years ago
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Sep 29, 2021Updated 4 years ago
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆18Sep 18, 2015Updated 10 years ago
- retrobob is a retro gaming emulator that runs directly on your browser. Super Nintendo, NES/Famicom, Gameboy and Gameboy Color are curren…☆11Mar 25, 2024Updated last year
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- A flyer we provide to every visitor of the Grazer Linuxtage☆13Nov 28, 2021Updated 4 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- ☆17Sep 22, 2016Updated 9 years ago
- Crypto library showing how to use NaCl and libsodium to encrypt and decrypt message securely.☆24Mar 2, 2014Updated 12 years ago
- grabs letterboxd watchlist and turns it into a rss feed of torrent magnet links.☆19Dec 4, 2015Updated 10 years ago
- Abusing U2F to 'store' a stable secret☆16Nov 23, 2015Updated 10 years ago
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Jan 16, 2018Updated 8 years ago
- A cryptographic method that defends against side-channel attacks☆25Nov 7, 2016Updated 9 years ago
- Secure multiparty messaging (kindof)☆21Jun 2, 2016Updated 9 years ago
- ☆24Jan 21, 2022Updated 4 years ago
- Compress sets of integers efficiently☆23Apr 17, 2025Updated 10 months ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Foundational Cryptography Framework for machine-checked proofs of cryptography.☆55Oct 2, 2025Updated 5 months ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- The Geneva electronic vote system, version 2 (prototype).☆30Jun 5, 2019Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆21Dec 3, 2015Updated 10 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆38Jun 1, 2025Updated 9 months ago
- A poor man MOSS (Measure of software similarity)☆31Jun 27, 2017Updated 8 years ago
- Running TPC-H on Apache Hive☆41Jul 15, 2019Updated 6 years ago
- Does your library check TLS certificates properly?☆79Aug 1, 2023Updated 2 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- SDCC plug-in for MPLABX☆15Dec 1, 2020Updated 5 years ago
- Extensions for Swagger2Markup☆10Apr 27, 2018Updated 7 years ago
- ☆11Sep 23, 2025Updated 5 months ago
- salty privacy☆52Aug 24, 2020Updated 5 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Sep 10, 2024Updated last year