AegisA free, secure and open source app for Android to manage your 2-step verification tokens.
Stars: ✭ 2,692 (+11.06%)
CfrpkiCloudflare's RPKI Toolbox
Stars: ✭ 104 (-95.71%)
Simple CryptographyScripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Stars: ✭ 40 (-98.35%)
FsocietyScript for encrypting a GNU/Linux filesystem and then destroying the keys
Stars: ✭ 159 (-93.44%)
AnonlinkPython implementation of anonymous linkage using cryptographic linkage keys
Stars: ✭ 41 (-98.31%)
CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Stars: ✭ 995 (-58.95%)
TrussedModern Cryptographic Firmware
Stars: ✭ 140 (-94.22%)
Transcrypttransparently encrypt files within a git repository
Stars: ✭ 993 (-59.03%)
X25519 DalekX25519 elliptic curve Diffie-Hellman key exchange in pure-Rust, using curve25519-dalek.
Stars: ✭ 179 (-92.62%)
Awesome Crypto PapersA curated list of cryptography papers, articles, tutorials and howtos.
Stars: ✭ 985 (-59.36%)
Fastsitephp🌟 FastSitePHP 🌟 A Modern Open Source Framework for building High Performance Websites and API’s with PHP
Stars: ✭ 102 (-95.79%)
ArchuserisoBuild Arch Linux iso images, create live usb drives, install on usb drives.
Stars: ✭ 36 (-98.51%)
Crypto RnnLearning the Enigma with Recurrent Neural Networks
Stars: ✭ 139 (-94.27%)
CryptoanalysisCogniCrypt_SAST: CrySL-to-Static Analysis Compiler
Stars: ✭ 36 (-98.51%)
Hs JoseHaskell JOSE and JWT library
Stars: ✭ 100 (-95.87%)
IocaneAn odorless, tasteless NodeJS crypto library that dissolves instantly in liquid
Stars: ✭ 35 (-98.56%)
Libsodium Jni(Android) Networking and Cryptography Library (NaCL) JNI binding. JNI is utilized for fastest access to native code. Accessible either in Android or Java application. Uses SWIG to generate Java JNI bindings. SWIG definitions are extensible to other languages.
Stars: ✭ 157 (-93.52%)
CryptographyCryptography Android application code samples / cipher collection for app users
Stars: ✭ 35 (-98.56%)
DesudesutalkSteganography for imageboards
Stars: ✭ 100 (-95.87%)
Sheep WolfWolves Among the Sheep
Stars: ✭ 138 (-94.31%)
HtmldocHTML Conversion Software
Stars: ✭ 99 (-95.92%)
LucidHigh performance and distributed KV store w/ REST API. 🦀
Stars: ✭ 171 (-92.95%)
Pki.jsPKI.js is a pure JavaScript library implementing the formats that are used in PKI applications (signing, encryption, certificate requests, OCSP and TSP requests/responses). It is built on WebCrypto (Web Cryptography API) and requires no plug-ins.
Stars: ✭ 960 (-60.4%)
ChurpDecentralize your secrets!
Stars: ✭ 100 (-95.87%)
PowersoftauAn independent implementation of the Powers of Tau MPC ceremony.
Stars: ✭ 32 (-98.68%)
CurvRust language general purpose elliptic curve cryptography.
Stars: ✭ 138 (-94.31%)
SiodbThe simplicity of REST and the power of SQL combined in a database that automatized security and performance. Forget the database, develop faster and safer!
Stars: ✭ 31 (-98.72%)
JavascriptA repository for All algorithms implemented in Javascript (for educational purposes only)
Stars: ✭ 16,117 (+564.89%)
CyberchefThe Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Stars: ✭ 13,674 (+464.11%)
Lethean VpnLethean Virtual Private Network (VPN)
Stars: ✭ 29 (-98.8%)
CitadelcoreCross platform filtering HTTP/S proxy based on .NET Standard 2.0.
Stars: ✭ 28 (-98.84%)
Encryptedrmd🔑 Password protected markdown html reports in R using libsodium
Stars: ✭ 136 (-94.39%)
LibblsBLS signatures, threshold encryption, distributed key generation library in modern C++. Actively maintained and used by SKALE for consensus, distributed random number gen, inter-chain communication and protection of transactions. BLS threshold signatures can be verified in Solidity, and used as random beacon (common coin)
Stars: ✭ 74 (-96.95%)
RubyzipOfficial Rubyzip repository
Stars: ✭ 1,189 (-50.95%)
ZboxZero-details, privacy-focused in-app file system.
Stars: ✭ 1,185 (-51.11%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-99.17%)
Wg InstallWireguard road warrior installer for Ubuntu, Debian, CentOS and Fedora
Stars: ✭ 99 (-95.92%)
EncpipeThe dum^H^H^Hsimplest encryption tool in the world.
Stars: ✭ 135 (-94.43%)
SimplednscryptA simple management tool for dnscrypt-proxy
Stars: ✭ 1,901 (-21.58%)
Chromium GostChromium с поддержкой алгоритмов ГОСТ
Stars: ✭ 123 (-94.93%)
Mkinitcpio YkfdeFull disk encryption with Yubikey (Yubico key)
Stars: ✭ 72 (-97.03%)
Wordpress HttpsWordPress HTTPS is intended to be an all-in-one solution to using SSL on WordPress sites.
Stars: ✭ 96 (-96.04%)
Practical Cryptography For Developers BookPractical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Stars: ✭ 2,400 (-0.99%)
VeracruzMain repository for the Veracruz privacy-preserving compute project.
Stars: ✭ 71 (-97.07%)
Endesiveen-crypt, de-crypt, si-gn, ve-rify - smime, pdf, xades and plain files in pure python
Stars: ✭ 122 (-94.97%)
Mongoaudit🔥 A powerful MongoDB auditing and pentesting tool 🔥
Stars: ✭ 1,174 (-51.57%)
SigfwOpen Source Signaling Firewall for SS7, Diameter filtering, antispoof and antisniff
Stars: ✭ 71 (-97.07%)
JsshaA JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
Stars: ✭ 2,089 (-13.82%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-93.11%)
Branca🔑 Secure alternative to JWT. Authenticated Encrypted API Tokens for Go.
Stars: ✭ 147 (-93.94%)
DatabunkerSecure storage for personal records built to comply with GDPR
Stars: ✭ 122 (-94.97%)
SsriStandard Subresource Integrity library for Node.js
Stars: ✭ 69 (-97.15%)