warner / petmail
secure messaging, file-transfer, and directory synchronization
☆41Updated 7 years ago
Alternatives and similar repositories for petmail:
Users that are interested in petmail are comparing it to the libraries listed below
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 2 months ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- ☆20Updated 9 years ago
- A Python implementation of JOSE☆14Updated 5 years ago
- PANORAMIX repo☆20Updated 2 years ago
- ipv6 to onion service virtual public network adapter☆11Updated 9 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- ☆10Updated 6 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- PGP packet parser library☆56Updated 5 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- Planning for next generation secure chat.☆37Updated 10 years ago
- Command-line utility to control Tor.☆89Updated last year
- Fast Python library for decrypting pgp messages☆17Updated 12 years ago
- Sign JSON objects with ED25519 signatures☆12Updated 2 years ago
- Server automation recipes for the LEAP Platform. Written mostly using puppet, and licensed under the GPLv3.☆50Updated 6 years ago
- Web of trust grapher☆38Updated 3 weeks ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Updated 4 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆29Updated 5 years ago
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Updated 10 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- ☆30Updated 10 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 8 years ago
- A user-first approach to threat modeling.☆16Updated 5 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- Python bindings to the Crypto++ library☆48Updated last year