UnchainedSecure password hashers for Go compatible with Django
Stars: ✭ 46 (-45.88%)
Dumb PasswordsDon't let your user be a victim of their own action
Stars: ✭ 77 (-9.41%)
ExonumAn extensible open-source framework for creating private/permissioned blockchain applications
Stars: ✭ 1,037 (+1120%)
JoeeccElliptic Curve Cryptography playground/toolkit written in pure Python
Stars: ✭ 46 (-45.88%)
Pwned Passwords🔐Go client library for checking values against compromised HIBP Pwned Passwords
Stars: ✭ 81 (-4.71%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-47.06%)
Cryptojs.swiftCross-platform cryptographic functions in swift
Stars: ✭ 42 (-50.59%)
CryptocatSecure chat software for your computer.
Stars: ✭ 1,011 (+1089.41%)
Crypto blogsBlogs about Cryptography/Security to follow
Stars: ✭ 41 (-51.76%)
Beamsplitter💎 Beamsplitter - A new (possibly universal) hash that passes SMHasher. Built mainly with a random 10x64 S-box. Also in NodeJS
Stars: ✭ 83 (-2.35%)
Swift CryptoOpen-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
Stars: ✭ 1,005 (+1082.35%)
Exonum ClientJavaScript client for Exonum blockchain
Stars: ✭ 62 (-27.06%)
FeatherpasswordmanagerHighly portable extremely light-weight password manager that stores all your passwords in a local encrypted file.
Stars: ✭ 39 (-54.12%)
LibblsBLS signatures, threshold encryption, distributed key generation library in modern C++. Actively maintained and used by SKALE for consensus, distributed random number gen, inter-chain communication and protection of transactions. BLS threshold signatures can be verified in Solidity, and used as random beacon (common coin)
Stars: ✭ 74 (-12.94%)
XortoolA tool to analyze multi-byte xor cipher
Stars: ✭ 993 (+1068.24%)
WaykichainPublic Blockchain as a Decentralized Finance Infrastructure Service Platform
Stars: ✭ 1,117 (+1214.12%)
Chrome Export PasswordsShow all your chromium passwords in format ready to import in other browser like FireFox
Stars: ✭ 80 (-5.88%)
X25519Public key cryptography library for Ruby providing the X25519 Diffie-Hellman function
Stars: ✭ 37 (-56.47%)
ConstantineConstant time pairing-based or elliptic curve based cryptography and digital signatures
Stars: ✭ 61 (-28.24%)
CryptoanalysisCogniCrypt_SAST: CrySL-to-Static Analysis Compiler
Stars: ✭ 36 (-57.65%)
PwnedpasswordsdllOpen source solution to check prospective AD passwords against previously breached passwords
Stars: ✭ 71 (-16.47%)
CryptographyCryptography Android application code samples / cipher collection for app users
Stars: ✭ 35 (-58.82%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (-29.41%)
PasswordcockpitPasswordcockpit is a simple, free, open source, self hosted, web based password manager for teams. It is made in PHP, Javascript, MySQL and it run on a docker service. It allows users with any kind of device to safely store, share and retrieve passwords, certificates, files and much more.
Stars: ✭ 34 (-60%)
FrescoA FRamework for Efficient Secure COmputation
Stars: ✭ 83 (-2.35%)
UfonetUFONet - Denial of Service Toolkit
Stars: ✭ 963 (+1032.94%)
MinisignA dead simple tool to sign files and verify digital signatures.
Stars: ✭ 1,105 (+1200%)
PowersoftauAn independent implementation of the Powers of Tau MPC ceremony.
Stars: ✭ 32 (-62.35%)
ComeoninPassword hashing specification for the Elixir programming language
Stars: ✭ 1,166 (+1271.76%)
Claimchain CoreA core and experimental implementation of ClaimChain
Stars: ✭ 30 (-64.71%)
Coniks JavaA CONIKS implementation in Java
Stars: ✭ 58 (-31.76%)
Lethean VpnLethean Virtual Private Network (VPN)
Stars: ✭ 29 (-65.88%)
Lightning RfcLightning Network Specifications
Stars: ✭ 1,224 (+1340%)
Sephia FiveA secure and PGP enabled webmail module for Phosphorus Five
Stars: ✭ 21 (-75.29%)
Pathwar☠️ The Pathwar Project ☠️
Stars: ✭ 58 (-31.76%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-76.47%)
AesAES-128 hardware implementation
Stars: ✭ 25 (-70.59%)
Java Crypto UtilsJava Cryptographic, Encoding and Hash Utilities
Stars: ✭ 15 (-82.35%)
IpfsfbInterPlanetary File System for Business (IPFSfB) is an enterprise blockchain storage network based on InterPlanetary File System.
Stars: ✭ 57 (-32.94%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+930.59%)
ThemisEasy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
Stars: ✭ 1,232 (+1349.41%)
Simon Speck Cexample C language implementation of SIMON and SPECK lightweight block ciphers.
Stars: ✭ 9 (-89.41%)
QtumQtum Core Wallet
Stars: ✭ 1,080 (+1170.59%)
IpchainIPChain Core Wallet
Stars: ✭ 26 (-69.41%)
Gurvygurvy implements Elliptic Curve Cryptography (+Pairing) for BLS12-381, BLS12-377, BW6-761, and BN256. Originally developed (and used) by gnark
Stars: ✭ 66 (-22.35%)
Waves⛓️ Reference Waves Blockchain Node (client) implementation on Scala
Stars: ✭ 1,077 (+1167.06%)
Fernet Java8Java 8 implementation of the Fernet Specification
Stars: ✭ 24 (-71.76%)
Merkle ToolsTools for creating Merkle trees, generating merkle proofs, and verification of merkle proofs.
Stars: ✭ 54 (-36.47%)
StreebogGOST R 34.11-2012: RFC-6986 cryptographic hash function
Stars: ✭ 24 (-71.76%)
YubikeylockdSimple daemon for locking and unlocking macOS with Yubikey
Stars: ✭ 78 (-8.24%)
Aeternityæternity: solving scalability problems by making sense of state-channels
Stars: ✭ 923 (+985.88%)
Crypto BenchBenchmarks for crypto libraries (in Rust, or with Rust bindings)
Stars: ✭ 67 (-21.18%)
CognicryptCogniCrypt is an Eclipse plugin that supports Java developers in using Java Cryptographic APIs.
Stars: ✭ 50 (-41.18%)
Eddsa Fault AttackFault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Stars: ✭ 53 (-37.65%)