One-end encryption, stronger than end-to-end
☆243Jan 28, 2026Updated last month
Alternatives and similar repositories for oee
Users that are interested in oee are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- free crypto audit☆31Mar 28, 2017Updated 8 years ago
- the cyber crypto cryptocoin☆35Dec 18, 2017Updated 8 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Feb 19, 2021Updated 5 years ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆32Feb 23, 2026Updated last month
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Jan 15, 2021Updated 5 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- ☆10Dec 13, 2016Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Practical Cryptoanalysis☆12Nov 23, 2015Updated 10 years ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆13Feb 4, 2018Updated 8 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆32Mar 26, 2018Updated 7 years ago
- ☆13Sep 14, 2022Updated 3 years ago
- Paranoia add-on for Thunderbird. See who is reading your emails.☆34Jun 23, 2024Updated last year
- ☆82Apr 18, 2020Updated 5 years ago
- pentagame on the screen: https://pentagame.herokuapp.com/☆10Dec 12, 2020Updated 5 years ago
- Jericho Chat - Information-theoretically secure communications☆22Mar 15, 2026Updated last week
- Constant time big numbers for Go☆106Feb 26, 2025Updated last year
- Crypto Audit Guidelines☆135Dec 28, 2020Updated 5 years ago
- Create wifi access points on the go (karma-like), simulate internet connectivity, gather whatever is sent ;)☆11Aug 7, 2025Updated 7 months ago
- an authenticated, chunked cipher based on BLAKE3☆23May 7, 2025Updated 10 months ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- WhatsApp History to HTML converter☆15Nov 9, 2012Updated 13 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- An Ash module that interfaces with the Github API☆10Oct 9, 2017Updated 8 years ago
- a grep -r for secrets☆179May 4, 2022Updated 3 years ago
- VERified asSembler for cryptographic primitives☆12Jul 15, 2023Updated 2 years ago
- A new revolution in the Penetration Testing scene... for kali Linux☆14Feb 14, 2014Updated 12 years ago
- PriFi, a low-latency, local-area anonymous communication network.☆52Jan 9, 2024Updated 2 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆37Feb 17, 2026Updated last month
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- watching 4 whole days of live stream, some memorable talks: notes & youtube positions☆12Nov 19, 2017Updated 8 years ago
- C library of Teserakt's E4 end-to-end security protocol☆15Feb 29, 2020Updated 6 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Jul 13, 2018Updated 7 years ago
- Detect and prevent crypto malware as it encrypts files☆69Nov 13, 2021Updated 4 years ago
- Remot.io is a simple, no install controller for html based presentations.☆44May 3, 2017Updated 8 years ago