Decrypt Threema's Android SQLite database
☆22Feb 2, 2016Updated 10 years ago
Alternatives and similar repositories for threema-decrypt
Users that are interested in threema-decrypt are comparing it to the libraries listed below
Sorting:
- Receive Threema messages in Mattermost☆10Jan 7, 2016Updated 10 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Alpine-based jump host with OpenSSH Server (sshd) and GnuPG (gnupg)☆10Mar 1, 2026Updated last week
- A dead simple library to simulate Minecraft biomes in pure Java☆10Jun 15, 2023Updated 2 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- Primitives library for openSCAD.☆10Aug 21, 2022Updated 3 years ago
- Port of GHEAT in Java☆16Jan 24, 2014Updated 12 years ago
- ☆18Aug 28, 2012Updated 13 years ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- templates for our relays☆12Mar 26, 2018Updated 7 years ago
- Password management and cracking training☆13Jul 15, 2025Updated 7 months ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 2 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- ☆10Apr 5, 2019Updated 6 years ago
- Troll the NSA with red flags and free speech! Flagger is a Firefox and Chrome extension that adds words like "Taliban" and "anthrax" into…☆16Aug 21, 2021Updated 4 years ago
- Firefox webextension showing number of tabs☆10Mar 2, 2022Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- Tools for people who attend key signing parties☆12Jan 27, 2017Updated 9 years ago
- ☆10Jan 19, 2022Updated 4 years ago
- ☆12Aug 18, 2020Updated 5 years ago
- Authentication / Authorization microservice☆10Mar 3, 2019Updated 7 years ago
- An Implementation of the MLS (Messaging Layer Security) Standard (RFC 9420) in Kotlin☆12Mar 15, 2024Updated last year
- Sphincs+ implementation which uses minimal RAM☆14Aug 31, 2023Updated 2 years ago
- Installation program to add Jacksum (CLI) and HashGarten (GUI) to Microsoft Windows. It also adds functions to the Send To menu which is …☆12Dec 1, 2024Updated last year
- a quick and simple powerdns exporter for metrics via the control socket interface☆11Oct 20, 2022Updated 3 years ago
- Simple Android app to speak some text passed in as a parameter. Intended to be used from the command line.☆15Feb 1, 2013Updated 13 years ago
- android-sms2csv.py extract SMS messages from Android backup files☆13Jun 19, 2020Updated 5 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Assembly 2015 4k intro compo entry☆11Oct 18, 2017Updated 8 years ago
- In This Repository you can find a module that will setup all of the files and configuration needed for GitHub Actions runner to work on L…☆12Nov 24, 2023Updated 2 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆29Jan 29, 2026Updated last month
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆12Apr 11, 2022Updated 3 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Jan 29, 2026Updated last month
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆11Oct 9, 2016Updated 9 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated 11 months ago