Python implementation of the Digital Signature Algorithm
☆21Sep 25, 2014Updated 11 years ago
Alternatives and similar repositories for DSA
Users that are interested in DSA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DSA Signature Algorithm - A simple implementation in Python☆12Apr 8, 2018Updated 7 years ago
- ☆20Dec 5, 2015Updated 10 years ago
- ☆21Oct 14, 2022Updated 3 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- 🖼️ Upload an image, video or album to Imgur via the command line☆12Feb 5, 2024Updated 2 years ago
- Something about C language.☆10Nov 13, 2020Updated 5 years ago
- Scripts utilitários para mazonOS☆10Apr 4, 2019Updated 6 years ago
- Docker container for running D compilers☆10Sep 1, 2023Updated 2 years ago
- Garbled circuits in Python☆25Jun 1, 2017Updated 8 years ago
- 华南师范大学Beamer模板☆15Nov 11, 2020Updated 5 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆21May 19, 2017Updated 8 years ago
- Random scripts and files I use for Android reversing☆17Feb 19, 2013Updated 13 years ago
- Mastering Bash, published by Packt☆19Jan 30, 2023Updated 3 years ago
- Reverse transparent protocol agnostic socks proxy.☆17Jan 14, 2020Updated 6 years ago
- Jaseem's dotfiles☆16Mar 16, 2026Updated last week
- Repositório do Curso de Exploração de Binários☆13Jan 9, 2021Updated 5 years ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Nov 10, 2016Updated 9 years ago
- Scan Onion Services for Security Issues☆11Jun 12, 2016Updated 9 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 12 years ago
- FButton - a flat button library for Android☆10Jun 9, 2014Updated 11 years ago
- Performance meets elegance.☆18Sep 28, 2021Updated 4 years ago
- Collection of Security Related Examples for Learning Purposes☆13Jan 29, 2016Updated 10 years ago
- From this tutorila you can learn how to print with POS printer from android app.☆14Jan 8, 2016Updated 10 years ago
- Computer Systems Security Assignments used for class.☆10Jun 11, 2017Updated 8 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Sep 5, 2020Updated 5 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Suave Azure Bootstrapper☆13Dec 4, 2016Updated 9 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Tools for timing attacks☆19Oct 19, 2015Updated 10 years ago
- Beginning C++ Programming, by Packt☆49Jan 18, 2023Updated 3 years ago
- My ~/.mutt (now customised for mutt-kz)☆21Nov 9, 2015Updated 10 years ago
- Create adversarial images to fool a MNIST classifier in TensorFlow☆14Jun 8, 2017Updated 8 years ago
- A simple tool that allows you to use your Android device's NFC to emulate the ID of a Mifare Card☆12Oct 22, 2017Updated 8 years ago
- Lollipop trust agent sample☆18Dec 24, 2014Updated 11 years ago
- PhysFS fork with magic streams☆12Apr 4, 2019Updated 6 years ago
- OpenGL rendering engine with software configured pipeline☆10Apr 9, 2025Updated 11 months ago